10,627 research outputs found
Development of a Barcode-Based Key System
This study provides a Web-based solution for issuing online key and accessing to
disconnected areas which are disconnected from any server or portal. In some
locations there is no facility for connecting to server, because of inaccessibility or
cost of network connection. Beside, the key must be generated in the easiest way for
customer’s convenience. Online users can book and reserve their desired room or can
purchase their coveted event’s ticket by the internet easily. The thesis gives reliable
solution to design a method and system for generating access code and issuing the
key or ticket with offering a safe and reduced cost way. The issued key is perceptible
for offline and standalone lock system. Barcode has been chosen, according to its
advantages, such as cheapness, simple product and ease of use. The Verifier Machine
can be located at each venue entry point are standalone devices, and are not
connected in any way neither among them nor to any central database, server or portal. Functionality of simulator application in generating the access code, ability of
portal in issuing barcode form key, stability of printed key and capability of
demonstrated standalone machine in decrypting and verifying was tested
successfully. The achieved system presents a simple, low cost, and flexible method
for authorization and authentication in accessing doors at remote area
Homo Datumicus : correcting the market for identity data
Effective digital identity systems offer great economic and civic potential. However, unlocking this potential requires dealing with social, behavioural, and structural challenges to efficient market formation. We propose that a marketplace for identity data can be more efficiently formed with an infrastructure that provides a more adequate representation of individuals online. This paper therefore introduces the ontological concept of Homo Datumicus: individuals as data subjects transformed by HAT Microservers, with the axiomatic computational capabilities to transact with their own data at scale. Adoption of this paradigm would lower the social risks of identity orientation, enable privacy preserving transactions by default and mitigate the risks of power imbalances in digital identity systems and markets
Spartan Daily, March 7, 1977
Volume 68, Issue 22https://scholarworks.sjsu.edu/spartandaily/6176/thumbnail.jp
Spartan Daily, March 7, 1977
Volume 68, Issue 22https://scholarworks.sjsu.edu/spartandaily/6176/thumbnail.jp
Encryption – use and control in E-commerce
The author describes how cryptography can be used to address modern business requirements such as identity protection, secure web access and digital signatures. Article by Robert Bond (Head of Innovation & Technology Group, Hobson Audley and Fellow of SALS). Published in Amicus Curiae - Journal of the Institute of Advanced Legal Studies and its Society for Advanced Legal Studies. The Journal is produced by the Society for Advanced Legal Studies at the Institute of Advanced Legal Studies, University of London
Smart test data generators via logic programming
We present a novel counterexample generator for the interactive theorem prover Isabelle based on a compiler that synthesizes test data generators for functional programming languages (e.g. Standard ML, OCaml) from specifications in Isabelle. In contrast to naive type-based test data generators, the smart generators take the preconditions into account and only generate tests that fulfill the preconditions. The smart generators are constructed by a compiler that reformulates the preconditions as logic programs and analyzes them by an enriched mode inference. From this inference, the compiler can construct the desired generators in the functional programming language. These test data generators are applied to find errors in specifications, as we show in a case study of a hotel key card system
Danger is My Middle Name: Experimenting with SSL Vulnerabilities in Android Apps
This paper presents a measurement study of information leakage and SSL
vulnerabilities in popular Android apps. We perform static and dynamic analysis
on 100 apps, downloaded at least 10M times, that request full network access.
Our experiments show that, although prior work has drawn a lot of attention to
SSL implementations on mobile platforms, several popular apps (32/100) accept
all certificates and all hostnames, and four actually transmit sensitive data
unencrypted. We set up an experimental testbed simulating man-in-the-middle
attacks and find that many apps (up to 91% when the adversary has a certificate
installed on the victim's device) are vulnerable, allowing the attacker to
access sensitive information, including credentials, files, personal details,
and credit card numbers. Finally, we provide a few recommendations to app
developers and highlight several open research problems.Comment: A preliminary version of this paper appears in the Proceedings of ACM
WiSec 2015. This is the full versio
Career Handbook
The job search, no matter what step you are on, can be a daunting and intimidating process. We want you to know that you are not alone in this journey. Since the day you arrived on campus, you have been surrounded by the support of family, friends, professors, staff, and peers. As you move into the next stage of your professional journey, we want you to know that you have the support of Career Services, the Alumni Association, and all of the employers who are part of the Hire a Rebel family to mentor, guide, and walk with you through the jobbing process. We are invested in the community of Las Vegas, the network of UNLV, and in each of you to help you to grow and transition from student to professional.
The road to career success is not as easy as we might hope for. You may encounter setbacks and struggles throughout the next few years, but keep in mind that each situation you encounter and every decision you make is shaping you into a Rebel professional. By taking advantage of the resources that come along with being a UNLV Rebel, you will network with amazing and successful professionals already thriving in the field, build your own career toolkit, and navigate through the professional world with the skill set that you learned while you were a student at UNLV.
Whether you are working in an office, stage, gallery, restaurant, school, or even your own home, you are equipped with the knowledge, drive, and determination to find success. You have the spirit of a Rebel within you. When roadblocks get in your way, use your network and your talents to navigate around, over, or through them. When you are met with overwhelming success, share those victories with your Rebel family. Remember that you are now and will always be connected through UNLV. We all have your back and are all excited for you on this journey.
You are a Rebel today and you will be a Rebel forever.
Welcome to the Hire a Rebel family!https://digitalscholarship.unlv.edu/career_handbook/1000/thumbnail.jp
- …