7,835 research outputs found
Enhancing cryptographic protection, authentication, and authorization in cellular networks: a comprehensive research study
This research article provides an extensive analysis of novel methods of cryptographic protection as well as advancements in authentication and authorization techniques within cellular networks. The aim is to explore recent literature and identify effective authentication and authorization methods, including high-speed data encryption. The significance of this study lies in the growing need for enhanced data security in scientific research. Therefore, the focus is on identifying suitable authentication and authorization schemes, including blockchain-based approaches for distributed mobile cloud computing. The research methodology includes observation, comparison, and abstraction, allowing for a comprehensive examination of advanced encryption schemes and algorithms. Topics covered in this article include multi-factor authentication, continuous authentication, identity-based cryptography for vehicle-to-vehicle (V2V) communication, secure blockchain-based authentication for fog computing, internet of things (IoT) device mutual authentication, authentication for wireless sensor networks based on blockchain, new secure authentication schemes for standard wireless telecommunications networks, and the security aspects of 4G and 5G cellular networks. Additionally, in the paper a differentiated authentication mechanism for heterogeneous 6G networks blockchain-based is discussed. The findings presented in this article hold practical value for organizations involved in scientific research and information security, particularly in encryption and protection of sensitive data
Mobile Device Background Sensors: Authentication vs Privacy
The increasing number of mobile devices in recent years has caused the collection of a large amount of personal information that needs to be protected. To this aim, behavioural biometrics has become very popular. But, what is the discriminative power of mobile behavioural biometrics in real scenarios? With the success of Deep Learning (DL), architectures based on Convolutional Neural Networks (CNNs) and Recurrent Neural Networks (RNNs), such as Long Short-Term Memory (LSTM), have shown improvements compared to traditional machine learning methods. However, these DL architectures still have limitations that need to be addressed. In response, new DL architectures like Transformers have emerged. The question is, can these new Transformers outperform previous biometric approaches? To answers to these questions, this thesis focuses on behavioural biometric authentication with data acquired from mobile background sensors (i.e., accelerometers and gyroscopes). In addition, to the best of our knowledge, this is the first thesis that explores and proposes novel behavioural biometric systems based on Transformers, achieving state-of-the-art results in gait, swipe, and keystroke biometrics. The adoption of biometrics requires a balance between security and privacy. Biometric modalities provide a unique and inherently personal approach for authentication. Nevertheless, biometrics also give rise to concerns regarding the invasion of personal privacy. According to the General Data Protection Regulation (GDPR) introduced by the European Union, personal data such as biometric data are sensitive and must be used and protected properly. This thesis analyses the impact of sensitive data in the performance of biometric systems and proposes a novel unsupervised privacy-preserving approach. The research conducted in this thesis makes significant contributions, including: i) a comprehensive review of the privacy vulnerabilities of mobile device sensors, covering metrics for quantifying privacy in relation to sensitive data, along with protection methods for safeguarding sensitive information; ii) an analysis of authentication systems for behavioural biometrics on mobile devices (i.e., gait, swipe, and keystroke), being the first thesis that explores the potential of Transformers for behavioural biometrics, introducing novel architectures that outperform the state of the art; and iii) a novel privacy-preserving approach for mobile biometric gait verification using unsupervised learning techniques, ensuring the protection of sensitive data during the verification process
Mobile heritage practices. Implications for scholarly research, user experience design, and evaluation methods using mobile apps.
Mobile heritage apps have become one of the most popular means for audience
engagement and curation of museum collections and heritage contexts. This
raises practical and ethical questions for both researchers and practitioners, such
as: what kind of audience engagement can be built using mobile apps? what are
the current approaches? how can audience engagement with these experience
be evaluated? how can those experiences be made more resilient, and in turn
sustainable? In this thesis I explore experience design scholarships together with
personal professional insights to analyse digital heritage practices with a view to
accelerating thinking about and critique of mobile apps in particular. As a result,
the chapters that follow here look at the evolution of digital heritage practices,
examining the cultural, societal, and technological contexts in which mobile
heritage apps are developed by the creative media industry, the academic
institutions, and how these forces are shaping the user experience design
methods. Drawing from studies in digital (critical) heritage, Human-Computer
Interaction (HCI), and design thinking, this thesis provides a critical analysis of
the development and use of mobile practices for the heritage. Furthermore,
through an empirical and embedded approach to research, the thesis also
presents auto-ethnographic case studies in order to show evidence that mobile
experiences conceptualised by more organic design approaches, can result in
more resilient and sustainable heritage practices. By doing so, this thesis
encourages a renewed understanding of the pivotal role of these practices in the
broader sociocultural, political and environmental changes.AHRC REAC
SYSTEM AND METHOD FOR PERFORMING TRANSACTIONS USING UNIFIED TRANSACTION IDENTIFIER (ID)
The present disclosure discloses a method and a system for performing transactions using unified transaction identifier (ID). In the present disclosure, the method includes generating a unified ID using credentials of a user during registration process. Herein, the unified ID is linked with one or more accounts of the user, one or more debit cards, credit cards, and the like, of the user. Post registering, the user such as, a sender having a unified ID can initiate a transaction with a recipient having a unified ID. Herein, while initiating the transaction from the sender to the recipient, the sender provides unified ID of the recipient. Upon entering the unified ID of the recipient, the unified ID system determines a risk rate and a payment limit associated with the initiated transaction. Then, the determined risk rate associated with the transaction is notified to the sender to complete or terminate the transaction
Enhancing healthcare services through cloud service: a systematic review
Although cloud-based healthcare services are booming, in-depth research has not yet been conducted in this field. This study aims to address the shortcomings of previous research by analyzing all journal articles from the last five years using the preferred reporting items for systematic reviews and meta-analyses (PRISMA) systematic literature review methodology. The findings of this study highlight the benefits of cloud-based healthcare services for healthcare providers and patients, including enhanced healthcare services, data security, privacy issues, and innovative information technology (IT) service delivery models. However, this study also identifies challenges associated with using cloud services in healthcare, such as security and privacy concerns, and proposes solutions to address these issues. This study concludes by discussing future research directions and the need for a complete solution that addresses the conflicting requirements of the security, privacy, efficiency, and scalability of cloud technologies in healthcare
Privacy Nicks: How the Law Normalizes Surveillance
Privacy law is failing to protect individuals from being watched and exposed, despite stronger surveillance and data protection rules. The problem is that our rules look to social norms to set thresholds for privacy violations, but people can get used to being observed. In this article, we argue that by ignoring de minimis privacy encroachments, the law is complicit in normalizing surveillance. Privacy law helps acclimate people to being watched by ignoring smaller, more frequent, and more mundane privacy diminutions. We call these reductions “privacy nicks,” like the proverbial “thousand cuts” that lead to death.Privacy nicks come from the proliferation of cameras and biometric sensors on doorbells, glasses, and watches, and the drift of surveillance and data analytics into new areas of our lives like travel, exercise, and social gatherings. Under our theory of privacy nicks as the Achilles heel of surveillance law, invasive practices become routine through repeated exposures that acclimate us to being vulnerable and watched in increasingly intimate ways. With acclimation comes resignation, and this shift in attitude biases how citizens and lawmakers view reasonable measures and fair tradeoffs.Because the law looks to norms and people’s expectations to set thresholds for what counts as a privacy violation, the normalization of these nicks results in a constant re-negotiation of privacy standards to society’s disadvantage. When this happens, the legal and social threshold for rejecting invasive new practices keeps getting redrawn, excusing ever more aggressive intrusions. In effect, the test of what privacy law allows is whatever people will tolerate. There is no rule to stop us from tolerating everything. This article provides a new theory and terminology to understand where privacy law falls short and suggests a way to escape the current surveillance spiral
Recommended from our members
Towards a systems-based framework for understanding the diffusion of technology: A case study of a modest technological innovation in the multi-agency context of policing
Technological innovation in policing is being given greater emphasis. In public discourse about technology and policing, there is often a focus on large-scale projects that are known to fail, sometimes at significant cost. The implementation of smaller innovations are often overlooked. This thesis examines practice of innovation and adoption in the context of multi-agency working.
The literature review in this thesis reveals that little is known about contexts where decision making does not rest with the police and exposes potential limitations in the use of diffusion and adoption frameworks/models. The research question is: In the context of multi-agency diffusion and adoption of a technology to enhance policing, can systems thinking techniques enhance, or even replace, existing frameworks and models?
This empirical research study looks at the adoption of a relatively simple technology that scans identification documents. However, the decision to adopt and implement an ID scanner takes place within a complex setting. Tracking an adoption decision requires understanding of the various actors and their roles. The research includes 48 semi-structured interviews with police officers, premises owners and managers and other stakeholders involved in the decision to adopt an ID scanner. Their perceptions of the history leading to an adoption decision, their own role and that of other key actors is examined.
Initial analysis takes place using spray diagrams and further analysis is made through the lenses of existing diffusion and adoption frameworks/models. Subsequently systems thinking techniques are deployed and the additional insights they provide are highlighted. This research finds that systems thinking can extend understanding of multi-agency diffusion and adoption decisions when compared with solely utilising existing frameworks/models. Finally, the research proposes a systems-based framework for collaborative diffusion and adoption analysis
A novel bottleneck residual and self-attention fusion-assisted architecture for land use recognition in remote sensing images
The massive yearly population growth is causing hazards to spread swiftly around the world and have a detrimental impact on both human life and the world economy. By ensuring early prediction accuracy, remote sensing enters the scene to safeguard the globe against weather-related threats and natural disasters. Convolutional neural networks, which are a reflection of deep learning, have been used more recently to reliably identify land use in remote sensing images. This work proposes a novel bottleneck residual and self-attention fusion-assisted architecture for land use recognition from remote sensing images. First, we proposed using the fast neural approach to generate cloud-effect satellite images. In neural style, we proposed a 5-layered residual block CNN to estimate the loss of neural-style images. After that, we proposed two novel architectures, named 3-layered bottleneck CNN architecture and 3-layered bottleneck self-attention CNN architecture, for the classification of land use images. Training has been conducted on both proposed and original neural-style generated datasets for both architectures. Subsequently, features are extracted from the deep layers and merged employing an innovative serial approach based on weighted entropy. By removing redundant and superfluous data, a novel Chimp Optimization technique is applied to the fused features in order to further refine them. In conclusion, selected features are classified using the help of neural network classifiers. The experimental procedure yielded respective accuracy rates of 99.0% and 99.4% when applied to both datasets. When evaluated in comparison to state-of-the-art (SOTA) methods, the outcomes generated by the proposed framework demonstrated enhanced precision and accuracy
Impact of Imaging and Distance Perception in VR Immersive Visual Experience
Virtual reality (VR) headsets have evolved to include unprecedented viewing quality. Meanwhile, they have become lightweight, wireless, and low-cost, which has opened to new applications and a much wider audience. VR headsets can now provide users with greater understanding of events and accuracy of observation, making decision-making faster and more effective. However, the spread of immersive technologies has shown a slow take-up, with the adoption of virtual reality limited to a few applications, typically related to entertainment. This reluctance appears to be due to the often-necessary change of operating paradigm and some scepticism towards the "VR advantage". The need therefore arises to evaluate the contribution that a VR system can make to user performance, for example to monitoring and decision-making. This will help system designers understand when immersive technologies can be proposed to replace or complement standard display systems such as a desktop monitor.
In parallel to the VR headsets evolution there has been that of 360 cameras, which are now capable to instantly acquire photographs and videos in stereoscopic 3D (S3D) modality, with very high resolutions. 360° images are innately suited to VR headsets, where the captured view can be observed and explored through the natural rotation of the head. Acquired views can even be experienced and navigated from the inside as they are captured.
The combination of omnidirectional images and VR headsets has opened to a new way of creating immersive visual representations. We call it: photo-based VR. This represents a new methodology that combines traditional model-based rendering with high-quality omnidirectional texture-mapping. Photo-based VR is particularly suitable for applications related to remote visits and realistic scene reconstruction, useful for monitoring and surveillance systems, control panels and operator training.
The presented PhD study investigates the potential of photo-based VR representations. It starts by evaluating the role of immersion and user’s performance in today's graphical visual experience, to then use it as a reference to develop and evaluate new photo-based VR solutions. With the current literature on photo-based VR experience and associated user performance being very limited, this study builds new knowledge from the proposed assessments.
We conduct five user studies on a few representative applications examining how visual representations can be affected by system factors (camera and display related) and how it can influence human factors (such as realism, presence, and emotions). Particular attention is paid to realistic depth perception, to support which we develop target solutions for photo-based VR. They are intended to provide users with a correct perception of space dimension and objects size. We call it: true-dimensional visualization.
The presented work contributes to unexplored fields including photo-based VR and true-dimensional visualization, offering immersive system designers a thorough comprehension of the benefits, potential, and type of applications in which these new methods can make the difference.
This thesis manuscript and its findings have been partly presented in scientific publications. In particular, five conference papers on Springer and the IEEE symposia, [1], [2], [3], [4], [5], and one journal article in an IEEE periodical [6], have been published
- …