20,577 research outputs found
Hacking Blind Navigation
Independent navigation in unfamiliar and complex environments is a major challenge for blind people. This challenge motivates a multi-disciplinary effort in the CHI community aimed at developing assistive technologies to support the orientation and mobility of blind people, including related disciplines such as accessible computing, cognitive sciences, computer vision, and ubiquitous computing. This workshop intends to bring these communities together to increase awareness on recent advances in blind navigation assistive technologies, benefit from diverse perspectives and expertises, discuss open research challenges, and explore avenues for multi-disciplinary collaborations. Interactions are fostered through a panel on Open Challenges and Avenues for Interdisciplinary Collaboration, Minute-Madness presentations, and a Hands-On Session where workshop participants can hack (design or prototype) new solutions to tackle open research challenges. An expected outcome is the emergence of new collaborations and research directions that can result in novel assistive technologies to support independent blind navigation
Implementation vulnerabilities in general quantum cryptography
Quantum cryptography is information-theoretically secure owing to its solid
basis in quantum mechanics. However, generally, initial implementations with
practical imperfections might open loopholes, allowing an eavesdropper to
compromise the security of a quantum cryptographic system. This has been shown
to happen for quantum key distribution (QKD). Here we apply experience from
implementation security of QKD to several other quantum cryptographic
primitives. We survey quantum digital signatures, quantum secret sharing,
source-independent quantum random number generation, quantum secure direct
communication, and blind quantum computing. We propose how the eavesdropper
could in principle exploit the loopholes to violate assumptions in these
protocols, breaking their security properties. Applicable countermeasures are
also discussed. It is important to consider potential implementation security
issues early in protocol design, to shorten the path to future applications.Comment: 13 pages, 8 figure
Registered reports: an early example and analysis
© 2019 Wiseman et al.The recent ‘replication crisis’ in psychology has focused attention on ways of increasing methodological rigor within the behavioral sciences. Part of this work has involved promoting ‘Registered Reports’, wherein journals peer review papers prior to data collection and publication. Although this approach is usually seen as a relatively recent development, we note that a prototype of this publishing model was initiated in the mid-1970s by parapsychologist Martin Johnson in the European Journal of Parapsychology (EJP). A retrospective and observational comparison of Registered and non-Registered Reports published in the EJP during a seventeen-year period provides circumstantial evidence to suggest that the approach helped to reduce questionable research practices. This paper aims both to bring Johnson’s pioneering work to a wider audience, and to investigate the positive role that Registered Reports may play in helping to promote higher methodological and statistical standards.Peer reviewe
Hacking commercial quantum cryptography systems by tailored bright illumination
The peculiar properties of quantum mechanics allow two remote parties to
communicate a private, secret key, which is protected from eavesdropping by the
laws of physics. So-called quantum key distribution (QKD) implementations
always rely on detectors to measure the relevant quantum property of single
photons. Here we demonstrate experimentally that the detectors in two
commercially available QKD systems can be fully remote-controlled using
specially tailored bright illumination. This makes it possible to tracelessly
acquire the full secret key; we propose an eavesdropping apparatus built of
off-the-shelf components. The loophole is likely to be present in most QKD
systems using avalanche photodiodes to detect single photons. We believe that
our findings are crucial for strengthening the security of practical QKD, by
identifying and patching technological deficiencies.Comment: Revised version, rewritten for clarity. 5 pages, 5 figures. To
download the Supplementary information (which is in open access), go to the
journal web site at http://dx.doi.org/10.1038/nphoton.2010.21
Expect the unexpected: the co-construction of assistive artifacts
This paper aims to explain emerging design activities within community-based rehabilitation contexts through the science of self-organization and adaptivity. It applies an evolutionary systematic worldview (Heylighen, 2011) to frame spontaneous collaboration between different local agents which produce self-made assistive artifacts. Through a process of distinction creation and distinction destruction occupational therapist, professional non-designers, caregivers and disabled people co-evolve simultaneously towards novel possibilities which embody a contemporary state of fitness. The conversation language is build on the principles of emotional seeding through stigmergic prototyping and have been practically applied as a form of design hacking which blends design time and use time. Within this process of co-construction the thought experiment of Maxwell’s Demon is used to map perceived behavior and steer the selecting process of following user-product adaptation strategies. This practice-based approach is illustrated through a case study and tries to integrate both rationality and intuition within emerging participatory design activities
Controlling single-photon detector ID210 with bright light
We experimentally demonstrate that a single-photon detector ID210
commercially available from ID Quantique is vulnerable to blinding and can be
fully controlled by bright illumination. In quantum key distribution, this
vulnerability can be exploited by an eavesdropper to perform a faked-state
attack giving her full knowledge of the key without being noticed. We consider
the attack on standard BB84 protocol and a subcarrier-wave scheme, and outline
a possible countermeasure.Comment: 6 pages, 5 figure
- …