1,104 research outputs found

    An Authenticated Privacy-Preserving Mobile Matchmaking Protocol Based on Social Connections with Friendship Ownership

    Get PDF
    The increase of mobile device use for social interaction drives the proliferation of online social applications. However, it prompts a series of security and existence problems. Some common problems are the authenticity of social contacts, the privacy of online communication, and the lack of physical interaction. This work presents mobile private matchmaking protocols that allow users to privately and immediately search the targets which match their planning purposes via mobile devices and wireless network. Based on social networks, the relationships of targets can be unlimited or limited to friends or friends of friends. It considers the privacy of users and the authenticity of friendships. The privacy means that no private information, except chosen targets, is leaked and the authenticity that signifies no forgery relationships can be successfully claimed. It applies to many applications such as searching for a person to talk to, to dine with, to play games with, or to see a movie with. The proposed scheme is demonstrated to be secure, effective, and efficient. The implementation of the proposed algorithms on Android system mobile devices allows users to securely find their target via mobile phones

    Security in Internet of Things: networked smart objects.

    Get PDF
    Internet of Things (IoT) is an innovative paradigm approaching both industries and humans every-day life. It refers to the networked interconnection of every-day objects, which are equipped with ubiquitous intelligence. It not only aims at increasing the ubiquity of the Internet, but also at leading towards a highly distributed network of devices communicating with human beings as well as with other devices. Thanks to rapid advances in underlying technologies, IoT is opening valuable opportunities for a large number of novel applications, that promise to improve the quality of humans lives, facilitating the exchange of services. In this scenario, security represents a crucial aspect to be addressed, due to the high level of heterogeneity of the involved devices and to the sensibility of the managed information. Moreover, a system architecture should be established, before the IoT is fully operable in an efficient, scalable and interoperable manner. The main goal of this PhD thesis concerns the design and the implementation of a secure and distributed middleware platform tailored to IoT application domains. The effectiveness of the proposed solution is evaluated by means of a prototype and real case studies

    Social, Private, and Trusted Wearable Technology under Cloud-Aided Intermittent Wireless Connectivity

    Get PDF
    There has been an unprecedented increase in the use of smart devices globally, together with novel forms of communication, computing, and control technologies that have paved the way for a new category of devices, known as high-end wearables. While massive deployments of these objects may improve the lives of people, unauthorized access to the said private equipment and its connectivity is potentially dangerous. Hence, communication enablers together with highly-secure human authentication mechanisms have to be designed.In addition, it is important to understand how human beings, as the primary users, interact with wearable devices on a day-to-day basis; usage should be comfortable, seamless, user-friendly, and mindful of urban dynamics. Usually the connectivity between wearables and the cloud is executed through the userā€™s more power independent gateway: this will usually be a smartphone, which may have potentially unreliable infrastructure connectivity. In response to these unique challenges, this thesis advocates for the adoption of direct, secure, proximity-based communication enablers enhanced with multi-factor authentication (hereafter refereed to MFA) that can integrate/interact with wearable technology. Their intelligent combination together with the connection establishment automation relying on the device/user social relations would allow to reliably grant or deny access in cases of both stable and intermittent connectivity to the trusted authority running in the cloud.The introduction will list the main communication paradigms, applications, conventional network architectures, and any relevant wearable-speciļ¬c challenges. Next, the work examines the improved architecture and security enablers for clusterization between wearable gateways with a proximity-based communication as a baseline. Relying on this architecture, the author then elaborates on the social ties potentially overlaying the direct connectivity management in cases of both reliable and unreliable connection to the trusted cloud. The author discusses that social-aware cooperation and trust relations between users and/or the devices themselves are beneļ¬cial for the architecture under proposal. Next, the author introduces a protocol suite that enables temporary delegation of personal device use dependent on diļ¬€erent connectivity conditions to the cloud.After these discussions, the wearable technology is analyzed as a biometric and behavior data provider for enabling MFA. The conventional approaches of the authentication factor combination strategies are compared with the ā€˜intelligentā€™ method proposed further. The assessment ļ¬nds signiļ¬cant advantages to the developed solution over existing ones.On the practical side, the performance evaluation of existing cryptographic primitives, as part of the experimental work, shows the possibility of developing the experimental methods further on modern wearable devices.In summary, the set of enablers developed here for wearable technology connectivity is aimed at enriching peopleā€™s everyday lives in a secure and usable way, in cases when communication to the cloud is not consistently available

    The Handheld Image: Art, History and Embodiment

    Get PDF
    This thesis investigates how images become present through movement and bodily performance. Inspiring this investigation are the contemporary practices of viewers engaging with still and moving images of people on their handheld screen devices. These practices are not only central to contemporary visuality, they also provide a focus for two wider themes relating to images of people: first, the dynamic tension between image control and circulation; and second, the mutual contestation of the physical and the virtual. To explore the struggle between image control and circulation, this thesis compares the dissemination of the twenty-first-century digital image with two historical instances of the handheld image: the sixteenth-century portrait miniature and the nineteenth-century carte de visite photographic portrait. While the physical control of the portrait miniature was paramount, the carte de visite, as the first form of mass-produced photograph, betrays the social benefits and perils of the shift from control to circulation. These historical forms are augmented through a consideration of contemporary moving-image portraiture that reveals the portrait as an interface for the interrelated demands and desires of artists, portrait subjects, and viewers. Having tracked handheld images through the sixteenth-century bedchamber and the nineteenth-century parlour, this thesis then follows handheld devices into the twenty-first-century bed to witness the contest between the somatic and the virtual: between the vulnerable, fatigued body and the seductions of online screen engagement. This thesis challenges the view that an image becomes more powerful through unfettered circulation. Rather it proposes that the potency of an image is powered by the contestation of meaning and memory, through the struggle between circulation and control. It is through these moments of struggle, and the unstable fluctuations between the actual and the virtual, that the image becomes present

    Perpetual Motion: Dance, Digital Cultures, and the Common

    Get PDF
    This book is freely available in an open access edition thanks to TOME (Toward an Open Monograph Ecosystem)ā€”a collaboration of the Association of American Universities, the Association of University Presses, and the Association of Research Librariesā€”and the generous support of The Ohio State University Libraries. Learn more at the TOME website, available at: https://openmonographs.org.Interactivity and Agency: Making-Common and the Limits of Difference -- Dance in Public: Of Common Spaces -- A World from a Crowd: Composing the Common -- Screen Sharing: Dance as Gift of the Commo

    The Internet of Everything

    Get PDF
    In the era before IoT, the world wide web, internet, web 2.0 and social media made peopleā€™s lives comfortable by providing web services and enabling access personal data irrespective of their location. Further, to save time and improve efficiency, there is a need for machine to machine communication, automation, smart computing and ubiquitous access to personal devices. This need gave birth to the phenomenon of Internet of Things (IoT) and further to the concept of Internet of Everything (IoE)

    Near Field Communication: From theory to practice

    Get PDF
    This book provides the technical essentials, state-of-the-art knowledge, business ecosystem and standards of Near Field Communication (NFC)by NFC Lab - Istanbul research centre which conducts intense research on NFC technology. In this book, the authors present the contemporary research on all aspects of NFC, addressing related security aspects as well as information on various business models. In addition, the book provides comprehensive information a designer needs to design an NFC project, an analyzer needs to analyze requirements of a new NFC based system, and a programmer needs to implement an application. Furthermore, the authors introduce the technical and administrative issues related to NFC technology, standards, and global stakeholders. It also offers comprehensive information as well as use case studies for each NFC operating mode to give the usage idea behind each operating mode thoroughly. Examples of NFC application development are provided using Java technology, and security considerations are discussed in detail. Key Features: Offers a complete understanding of the NFC technology, including standards, technical essentials, operating modes, application development with Java, security and privacy, business ecosystem analysis Provides analysis, design as well as development guidance for professionals from administrative and technical perspectives Discusses methods, techniques and modelling support including UML are demonstrated with real cases Contains case studies such as payment, ticketing, social networking and remote shopping This book will be an invaluable guide for business and ecosystem analysts, project managers, mobile commerce consultants, system and application developers, mobile developers and practitioners. It will also be of interest to researchers, software engineers, computer scientists, information technology specialists including students and graduates.Publisher's Versio

    ā€œThat\u27s How She Talksā€: Animating Text Message Evidence in the Sexual Assault Trial

    Get PDF
    This ethnographic study of criminal sexual assault adjudication shows how prosecutors, defense attorneys, and witnesses animate text message evidence. In contrast to other forms of courtroom testimony, text messages function as multiauthored representations of recorded correspondence in the past. Attorneys and witnesses animate texts authored by or said to characterize persons represented at trial. By whom and how the texts are animated shapes trial processes. Through a detailed comparative case analysis of two Milwaukee, WI, sexual assault trials, this article attends to the process by which text messages are said to personify or characterize authorsā€™ meaning and intent. This animation of electronically transmitted text speaks to credibility and variably emphasizes a witness\u27s place within gendered and racialized cultural norms. Rather than unsettling the trope of ā€œhe said, she said,ā€ text messages become contested evidence animated by court actors within contexts of longā€standing cultural narratives of sexual victimization and offending
    • ā€¦
    corecore