2,773 research outputs found
Recommended from our members
Privacy-Preserving, Taxable Bank Accounts
Current banking systems do not aim to protect user privacy. Purchases made from a single bank account can be linked to each other by many parties. This could be addressed in a straight-forward way by generating unlinkable credentials from a single master credential using Camenisch and Lysyanskaya's algorithm; however, if bank accounts are taxable, some report must be made to the tax authority about each account. Using unlinkable credentials, digital cash, and zero knowledge proofs of knowledge, we present a solution that prevents anyone, even the tax authority, from knowing which accounts belong to which users, or from being able to link any account to another or to purchases or deposits
Study Of Electronic Cash: Its Impact On The Economy And Society, And Its Future
Technological advancement has introduced an electronic method for the payment for goods and services. With these advancements and the growth of the internet, the market-place of the world has become one universe without borders. This paper examines the various methods of electronic payment for goods and services and the domestic and international laws that govern their operations. The paper explores concerns about money laundering, counterfeiting, internet security, cyber scams in electronic cash as well as proffered security solutions to these problems. The paper concludes with the proposition that electronic cash in the form of cards (ATM) are more accessible to the masses as compared to electronic cash based on PCs and the Internet
A qualitative action research study introducing a metacognitive framework for teaching preparation and analysis of its efficacy
A dissertation submitted to the Faculty of Science, University of the Witwatersrand, Johannesburg, in fulfilment of requirements for the degree of Master of Science. Johannesburg, 28 May 2016.This qualitative study sets out to examine a teacher’s metacognitive preparation for and reflection on the mathematical content and pedagogy of a short series of Grade Six Probability lessons, with their contribution to the development of a general framework for lesson preparation from a metacognitive perspective. An action research methodology is followed in which teaching episodes are collaboratively assessed by a panel of three colleagues. These fora serve to enlighten the author of their observations after the preparation and teaching of a series of Probability lessons, which also capture audio data for deep reflections and dialogue post teaching and fora. The analysis of the data will serve as the foundation for the development of a metacognitive framework that teachers can use in their preparation for and reflection of lessons that will pay particular attention to higher cognitive engagement of teachers with content and facilitating lesson delivery, always striving for them to be of higher quality. The efficacy of this framework for the teacher-researcher’s teaching practice is also examined
With False Friends Like These, Who Can Notice Mistakes?
Adversarial examples crafted by an explicit adversary have attracted
significant attention in machine learning. However, the security risk posed by
a potential false friend has been largely overlooked. In this paper, we unveil
the threat of hypocritical examples -- inputs that are originally misclassified
yet perturbed by a false friend to force correct predictions. While such
perturbed examples seem harmless, we point out for the first time that they
could be maliciously used to conceal the mistakes of a substandard (i.e., not
as good as required) model during an evaluation. Once a deployer trusts the
hypocritical performance and applies the "well-performed" model in real-world
applications, unexpected failures may happen even in benign environments. More
seriously, this security risk seems to be pervasive: we find that many types of
substandard models are vulnerable to hypocritical examples across multiple
datasets. Furthermore, we provide the first attempt to characterize the threat
with a metric called hypocritical risk and try to circumvent it via several
countermeasures. Results demonstrate the effectiveness of the countermeasures,
while the risk remains non-negligible even after adaptive robust training.Comment: AAAI 202
A Digital Cash Paradigm with Valued and No-Valued e-Coins
Digital cash is a form of money that is stored digitally. Its main advantage when compared to traditional credit or debit cards is the possibility of carrying out anonymous transactions. Diverse digital cash paradigms have been proposed during the last decades, providing different approaches to avoid the double-spending fraud, or features like divisibility or transferability. This paper presents a new digital cash paradigm that includes the so-called no-valued e-coins, which are e-coins that can be generated free of charge by customers. A vendor receiving a payment cannot distinguish whether the received e-coin is valued or not, but the customer will receive the requested digital item only in the former case. A straightforward application of bogus transactions involving no-valued e-coins is the masking of consumption patterns. This new paradigm has also proven its validity in the scope of privacy-preserving pay-by-phone parking systems, and we believe it can become a very versatile building block in the design of privacy-preserving protocols in other areas of research. This paper provides a formal description of the new paradigm, including the features required for each of its components together with a formal analysis of its security.This research was funded by the Spanish Ministry of Science, Innovation and Universities grant number MTM2017-83271-R
Is electronic cash possible?
Cash-like payments in electronic commerce and at the traditional point of sale are expected to be beneficial, e.g., because of privacy protection, low transaction costs, and irrevocability. Therefore, we discuss how to design electronic cash in a way that it both mirrors the most important characteristics of raditional cash, but also fulfils the expectations which arise towards electronic means of payment. We analyse the problems and trade-offs between the different characteristics to be implemented. This analysis is based on a user survey and a review of existing technologies for electronic payment systems. Finally we argue why existing systems do not fulfil the critical requirements, and point out future work towards electronic cash which will meet more requirements
- …