47,250 research outputs found
The memory space: Exploring future uses of Web 2.0 and mobile internet through design interventions.
The QuVis Quantum Mechanics Visualization project aims to address challenges
of quantum mechanics instruction through the development of interactive
simulations for the learning and teaching of quantum mechanics. In this
article, we describe evaluation of simulations focusing on two-level systems
developed as part of the Institute of Physics Quantum Physics resources.
Simulations are research-based and have been iteratively refined using student
feedback in individual observation sessions and in-class trials. We give
evidence that these simulations are helping students learn quantum mechanics
concepts at both the introductory and advanced undergraduate level, and that
students perceive simulations to be beneficial to their learning.Comment: 15 pages, 5 figures, 1 table; accepted for publication in the
American Journal of Physic
The memory space: Exploring future uses of Web 2.0 and mobile internet through design interventions.
SecuCode: Intrinsic PUF Entangled Secure Wireless Code Dissemination for Computational RFID Devices
The simplicity of deployment and perpetual operation of energy harvesting
devices provides a compelling proposition for a new class of edge devices for
the Internet of Things. In particular, Computational Radio Frequency
Identification (CRFID) devices are an emerging class of battery-free,
computational, sensing enhanced devices that harvest all of their energy for
operation. Despite wireless connectivity and powering, secure wireless firmware
updates remains an open challenge for CRFID devices due to: intermittent
powering, limited computational capabilities, and the absence of a supervisory
operating system. We present, for the first time, a secure wireless code
dissemination (SecuCode) mechanism for CRFIDs by entangling a device intrinsic
hardware security primitive Static Random Access Memory Physical Unclonable
Function (SRAM PUF) to a firmware update protocol. The design of SecuCode: i)
overcomes the resource-constrained and intermittently powered nature of the
CRFID devices; ii) is fully compatible with existing communication protocols
employed by CRFID devices in particular, ISO-18000-6C protocol; and ii) is
built upon a standard and industry compliant firmware compilation and update
method realized by extending a recent framework for firmware updates provided
by Texas Instruments. We build an end-to-end SecuCode implementation and
conduct extensive experiments to demonstrate standards compliance, evaluate
performance and security.Comment: Accepted to the IEEE Transactions on Dependable and Secure Computin
e-SAFE: Secure, Efficient and Forensics-Enabled Access to Implantable Medical Devices
To facilitate monitoring and management, modern Implantable Medical Devices
(IMDs) are often equipped with wireless capabilities, which raise the risk of
malicious access to IMDs. Although schemes are proposed to secure the IMD
access, some issues are still open. First, pre-sharing a long-term key between
a patient's IMD and a doctor's programmer is vulnerable since once the doctor's
programmer is compromised, all of her patients suffer; establishing a temporary
key by leveraging proximity gets rid of pre-shared keys, but as the approach
lacks real authentication, it can be exploited by nearby adversaries or through
man-in-the-middle attacks. Second, while prolonging the lifetime of IMDs is one
of the most important design goals, few schemes explore to lower the
communication and computation overhead all at once. Finally, how to safely
record the commands issued by doctors for the purpose of forensics, which can
be the last measure to protect the patients' rights, is commonly omitted in the
existing literature. Motivated by these important yet open problems, we propose
an innovative scheme e-SAFE, which significantly improves security and safety,
reduces the communication overhead and enables IMD-access forensics. We present
a novel lightweight compressive sensing based encryption algorithm to encrypt
and compress the IMD data simultaneously, reducing the data transmission
overhead by over 50% while ensuring high data confidentiality and usability.
Furthermore, we provide a suite of protocols regarding device pairing,
dual-factor authentication, and accountability-enabled access. The security
analysis and performance evaluation show the validity and efficiency of the
proposed scheme
Recommended from our members
Secure & trusted communication in emergency situations
In this paper we propose SETS, a protocol with main aim to provide secure and private communication during emergency situations. SETS achieves security of the exchanged information, attack resilience and user’s privacy. In addition, SETS can be easily adapted for mobile devices, since field experimental results show the effectiveness of the protocol on actual smart-phone platforms
HIGH CAPACITY AND OPTIMIZED IMAGE STEGANOGRAPHY TECHNIQUE BASED ON ANT COLONY OPTIMIZATION ALGORITHM
The tremendous development of digital technology, it is mandatory to address the security while transmitting information over network in a way that observer couldn’t depict it. Measures to be taken to provide the security by establishing hidden communication using steganography principle which is help to camouflage the secret information in some carrier file such as text, image, audio and video. In this era of hidden data communication, image becoming an effective tool on account of their frequency, capability and accuracy. Image steganography uses an image as a carrier medium to hide the secret data. The main motive of this article is that the uses the combination of frequency domain and optimization method inorder to increasing in robustness. In this article, Integer Wavelet transform is performed into the host image and coefficients have been transformed. ACO optimization algorithm is used to find the optimal coefficients where to hide the data. Furthermore, sample images and information having been demonstrated which proved the increased robustness as well as high level of data embedding capacity
- …