14,851 research outputs found

    Making Code Voting Secure against Insider Threats using Unconditionally Secure MIX Schemes and Human PSMT Protocols

    Full text link
    Code voting was introduced by Chaum as a solution for using a possibly infected-by-malware device to cast a vote in an electronic voting application. Chaum's work on code voting assumed voting codes are physically delivered to voters using the mail system, implicitly requiring to trust the mail system. This is not necessarily a valid assumption to make - especially if the mail system cannot be trusted. When conspiring with the recipient of the cast ballots, privacy is broken. It is clear to the public that when it comes to privacy, computers and "secure" communication over the Internet cannot fully be trusted. This emphasizes the importance of using: (1) Unconditional security for secure network communication. (2) Reduce reliance on untrusted computers. In this paper we explore how to remove the mail system trust assumption in code voting. We use PSMT protocols (SCN 2012) where with the help of visual aids, humans can carry out mod  10\mod 10 addition correctly with a 99\% degree of accuracy. We introduce an unconditionally secure MIX based on the combinatorics of set systems. Given that end users of our proposed voting scheme construction are humans we \emph{cannot use} classical Secure Multi Party Computation protocols. Our solutions are for both single and multi-seat elections achieving: \begin{enumerate}[i)] \item An anonymous and perfectly secure communication network secure against a tt-bounded passive adversary used to deliver voting, \item The end step of the protocol can be handled by a human to evade the threat of malware. \end{enumerate} We do not focus on active adversaries

    Demand for satellite-provided domestic communications services up to the year 2000

    Get PDF
    Three fixed service telecommunications demand assessment studies were completed for NASA by The Western Union Telegraph Company and the U.S. Telephone and Telegraph Corporation. They provided forecasts of the total U.S. domestic demand, from 1980 to the year 2000, for voice, data, and video services. That portion that is technically and economically suitable for transmission by satellite systems, both large trunking systems and customer premises services (CPS) systems was also estimated. In order to provide a single set of forecasts a NASA synthesis of the above studies was conducted. The services, associated forecast techniques, and data bases employed by both contractors were examined, those elements of each judged to be the most appropriate were selected, and new forecasts were made. The demand for voice, data, and video services was first forecast in fundamental units of call-seconds, bits/year, and channels, respectively. Transmission technology characteristics and capabilities were then forecast, and the fundamental demand converted to an equivalent transmission capacity. The potential demand for satellite-provided services was found to grow by a factor of 6, from 400 to 2400 equivalent 36 MHz satellite transponders over the 20-year period. About 80 percent of this was found to be more appropriate for trunking systems and 20 percent CPS

    Impact of EU duty cycle and transmission power limitations for sub-GHz LPWAN SRDs : an overview and future challenges

    Get PDF
    Long-range sub-GHz technologies such as LoRaWAN, SigFox, IEEE 802.15.4, and DASH7 are increasingly popular for academic research and daily life applications. However, especially in the European Union (EU), the use of their corresponding frequency bands are tightly regulated, since they must confirm to the short-range device (SRD) regulations. Regulations and standards for SRDs exist on various levels, from global to national, but are often a source of confusion. Not only are multiple institutes responsible for drafting legislation and regulations, depending on the type of document can these rules be informational or mandatory. Regulations also vary from region to region; for example, regulations in the United States of America (USA) rely on electrical field strength and harmonic strength, while EU regulations are based on duty cycle and maximum transmission power. A common misconception is the presence of a common 1% duty cycle, while in fact the duty cycle is frequency band-specific and can be loosened under certain circumstances. This paper clarifies the various regulations for the European region, the parties involved in drafting and enforcing regulation, and the impact on recent technologies such as SigFox, LoRaWAN, and DASH7. Furthermore, an overview is given of potential mitigation approaches to cope with the duty cycle constraints, as well as future research directions

    Modeling e-Business with eBML

    Get PDF
    In this paper we demonstrate that modeling e-business strategies is important in a time where the first e-business disillusionment has taken place. The objective of this Paper is twofold. First we propose a theoretical e-business model framework (eBMF) for aligning e-business initiatives and projects. This framework rep-resents an ontology, which will allow firms to develop a sound e-business model, in an environment that is amongst other things characterized by new forms of network organizations. Second we show why the eX-tensible Markup Language (XML) is an adequate technology for describing this theoretical framework in a formal way.xml, e-business models, e-business

    Study on the feasibility of a tool to measure the macroeconomic impact of structural reforms

    Get PDF
    The main aim of this study is to assess the feasibility of empirical tools to study the impact of structural reforms on the macroeconomic performance in the member countries of the European Union (EU). This report presents the results of the project "Study on the feasibility of a tool to measure the macroeconomic impact of structural reforms" (ECFIN-E/2005/001) and amalgamates the findings of the two previous interim reports and the main conclusions of the workshop held in Brussels on May 11th. The main goal of the project is to determine the most reliable and robust methods to investigate the impacts of economy-wide structural reforms as well as reforms in individual markets or sectors, and to make suggestions as to how they best to implement them and possible improvements of the institutional dataset. In addition, a roadmap has been created which includes the main steps in the model-developing process, and solutions feasible even in the short term are discussed.The most relevant conclusion to be drawn from the study is that the most appropriate tool that can be developed in the short term is the integration of a DSGE model (preferably QUEST due to its in-house availability) with different satellite models, to be developed.structural reforms, product markets, labour markets, financial markets, Dreger, Art�s, Moreno, Ramos, Suri�ach

    ACCOUNTING IN CONTEXT OF COMMUNICATION, LANGUAGE, AND INFORMATION

    Get PDF
    Accounting at various times has been referred to as a communication process, a language, and a conveyor of information. Given this condition, an analysis of accounting in terms of the theories relating to those references would enable an understanding of: (1) how well the parts of accounting conform with language theory; (2) how communication theory can aid in the clarification and improvement of the accounting communication process; and (3) how relevant is information theory for the refinement of accounting information. This study is a partial analysis which presents some implications of those theories for accounting.information theory, financial analysis, behavior patterns, financial statements, structure assignment algorithm, predictability, information content, entropy.

    Stability of a Random Multiple Access Channel with "Success-Failure" Feedback

    Full text link
    We consider a model of a decentralized multiple access system with a non-standard binary feedback where the empty and collision situations cannot be distinguished. We show that, like in the case of a ternary feedback, for any input rate \lambda < 1/e, there exists a "doubly randomized" adaptive transmission protocol which stabilizes the behavior of the system. We discuss also a number of related problems and formulate some hypotheses.Comment: 11 pages, ! figur
    • …
    corecore