31,047 research outputs found

    Secure Dating with Four or Fewer Cards

    Get PDF
    In Cornell\u27s “CS4830: Introduction to Cryptography” offered Fall 2015, students are asked to devise a physical secure two-party protocol for computing AND, using 4 cards or fewer. An elegant 5-card scheme was first proposed by Boer et al. Recently, in Asiacrypt 2012, Mizuki et al. were the first to improve the scheme to 4 cards. Although they mention that 4 cards is the minimum -- the minimum only holds when users must encode their input each with two cards. Given the collective wisdom of our Cornell CS4830 students, we demonstrate an array of creative schemes using from 1 to 4 cards. Our students documented these solutions in a homework assignment, many of which are unanticipated by the instructor and the TAs. We had fun with students\u27 solutions and therefore would like to share them. Several of the students solutions are simpler than the standard textbook version by Boer et al., and we imagine that they could be useful for pedagogical purposes

    Spartan Daily, October 21, 1942

    Get PDF
    Volume 31, Issue 15https://scholarworks.sjsu.edu/spartandaily/3495/thumbnail.jp

    The patterning of finance/security : a designerly walkthrough of challenger banking apps

    Get PDF
    Culture is being ‘appified’. Diverse, pre-existing everyday activities are being redesigned so they happen with and through apps. While apps are often encountered as equivalent icons in apps stores or digital devices, the processes of appification – that is, the actions required to turn something into an app – vary significantly. In this article, we offer a comparative analysis of a number of ‘challenger’ banking apps in the United Kingdom. As a retail service, banking is highly regulated and banks must take steps to identify and verify their customers before entering a retail relationship. Once established, this ‘secured’ financial identity underpins a lot of everyday economic activity. Adopting the method of the walkthrough analysis, we study the specific ways these processes of identifying and verifying the identity of the customer (now the user) occur through user onboarding. We argue that banking apps provide a unique way of binding the user to an identity, one that combines the affordances of smart phones with the techniques, knowledge and patterns of user experience design. With the appification of banking, we see new processes of security folded into the everyday experience of apps. Our analysis shows how these binding identities are achieved through what we refer to as the patterning of finance/security. This patterning is significant, moreover, given its availability for wider circulation beyond the context of retail banking apps

    Recording and reporting practices in some New England kindergartens.

    Full text link
    Thesis (M.A.)--Boston Universit

    The Cord (January 7, 2015)

    Get PDF

    Collaboration between unions in a multi-union, non-exclusive bargaining regime: What can Canada learn from New Zealand?

    Get PDF
    The Canadian union certification system guarantees workers rights to organise, bargain collectively, and strike only when a majority of co-workers favours unionisation. This contravenes International Labour Organisation standards, in which the freedom to associate is unqualified by majority support. In recent years, the Supreme Court of Canada has drawn on ILO principles to interpret constitutional rights as covering organising and collective bargaining activities related to freedom of association under section 2(d) of the Charter of Rights and Freedoms. However, it has not as yet ordered Canadian governments to enact labour relations laws consistent with these new constitutional rights. Neither has there been a general call for such legislative change. Instead, many fear that statutory support for non-majority unionism would lead to multi-union representation and intensified inter-union competition, but fail to consider that sharing the workplace might actually promote inter-union cooperation against a common adversary in management. This study addresses this shortcoming by looking at the extent and nature of inter-union collaboration in New Zealand, where non-majority, non-exclusive representation exists already. Collaboration was found to be common, not only over bargaining and lobbying, but also in organising. Implications for Canada are explored

    Recording and reporting practices in some New England kindergartens.

    Full text link
    Thesis (M.A.)--Boston Universit

    Victimization by bullying and non-bullying aggression: An evolutionary psychological perspective

    Get PDF
    Using an evolutionary psychological perspective, I investigated the correlates of two kinds of peer victimization with differential power relations between the perpetrator and victim. Bullying is goal-directed aggression towards an individual with less power than the perpetrator. In contrast, non-bullying aggression is aimed towards an individual of equal or greater power than the perpetrator. Specifically, I examined the relation between psychosocial vulnerability and evolutionary advantages with both types of victimization. A total of 627 adolescents aged 9-14 years (M = 11.93; SD = 1.40) completed self-report and peer nomination measures. Indicators of psychosocial vulnerability included emotional problems and fewer close friendships. Evolutionary advantages were assessed by measuring peer-nominated physical attractiveness, dating popularity, perceived popularity, and respect by others. Victimization by bullying was not related to psychosocial vulnerability, but was negatively associated with physical attractiveness, perceived popularity, and respect. As predicted, victimization by non-bullying aggression was positively associated with all four evolutionary advantages. The results demonstrate the importance of measuring the power relation between the perpetrator and victim when studying peer victimization. Adolescents victimized by those with greater power may be targeted due to the vulnerability of having fewer evolutionary advantages. In contrast, adolescents victimized by those of equal or less power may be targeted due to competition and rivalry, insofar as they possess greater evolutionary advantages than their peers, which mark them as rivals

    IDEAS Collaborative: Updated Market and Audience Research

    Get PDF
    This new market analysis was conducted in an effort to understand the current landscape of arts and cultural audiences in the Syracuse area and expanded Central New York. And, when possible to compare that landscape to what it was in 2010. The report illustrates the current state of consumer demand and market penetration of the participating IDEAS organizations. Analysis of the current data provides insight into some market changes that may have resulted from efforts of the initiative and individual participating organizations
    • 

    corecore