1,025 research outputs found

    The Eyes of the Beholder: does responsibility for the lack of quality screenplays really lie at the door of inadequately trained screenwriters?

    Get PDF
    The relative lack of success for British films in the marketplace is often cited as being rooted in the lack of quality screenplays. As the primary strategic body for film in Britain, the UK Film Council subscribes to this broad analysis and has identified training as one of the key strategies for overcoming this weakness. In this article, I question this assumption and examine to what extent the decision-makers, and the processes of decision-making, themselves are a problem in the development of talent and quality British films

    ProvablySecure Authenticated Group Diffie-Hellman Key Exchange

    Get PDF
    Abstract: Authenticated key exchange protocols allow two participants A and B, communicating over a public network and each holding an authentication means, to exchange a shared secret value. Methods designed to deal with this cryptographic problem ensure A (resp. B) that no other participants aside from B (resp. A) can learn any information about the agreed value, and often also ensure A and B that their respective partner has actually computed this value. A natural extension to this cryptographic method is to consider a pool of participants exchanging a shared secret value and to provide a formal treatment for it. Starting from the famous 2-party Diffie-Hellman (DH) key exchange protocol, and from its authenticated variants, security experts have extended it to the multi-party setting for over a decade and completed a formal analysis in the framework of modern cryptography in the past few years. The present paper synthesizes this body of work on the provably-secure authenticated group DH key exchange. The present paper revisits and combines the full versions of the following four papers

    The Total Filmmaker: thinking of screenwriting, directing and editing as one role

    Get PDF
    As screenwriting continues to establish itself as a discrete discipline in academia, either in alignment with creative writing departments or film and media practice departments, there is a danger that such developments may entrench a distancing of the craft from the cinematic form itself and that such a distancing may ultimately reinforce the screenplay's propensity for dramaturgy and the dramatic, rather than the sensory and experiential of the cinematic. Closely related creative stages in telling cinematic stories include directing and editing and this article seeks to argue, with reference to personal screen practice, that screenwriting, directing and editing are, in fact, three variations of the same thing. The article proposes the notion of the Total Filmmaker who embraces all three aspects of the cinematic storyteller. If the ultimate aim is to create a narrative that fully utilises the unique properties of the cinematic form in telling a story, rather than being dominated by the theatricality of dramatically driven classical narratives. How might one explore the relationship between screenwriting, directing and editing? Can an integrated approach to creating the cinematic blueprint change the way we think of pedagogy and screenwriting

    Group Diffie-Hellman Key Exchange Secure against Dictionary Attacks

    Get PDF
    Group Diffie-Hellman schemes for password-based key exchange are designed to provide a pool of players communicating over a public network, and sharing just a human-memorable password, with a session key (e.g, the key is used for multicast data integrity and confidentiality) . The fundamental security goal to achieve in this scenario is security against dictionary attacks. While solutions have been proposed to solve this problem no formal treatment has ever been suggested. In this paper, we define a security model and then present a protocol with its security proof in both the random oracle model and the ideal-cipher model

    Manual engagement and automation in amateur photography

    Full text link
    © 2017, © The Author(s) 2017. Automation has been central to the development of modern photography and, in the age of digital and smartphone photography, now largely defines everyday experience of the photographic process. In this article, we question the acceptance of automation as the default position for photography, arguing that discussions of automation need to move beyond binary concerns of whether to automate or not and, instead, to consider what is being automated and the degree of automation couched within the particularities of people’s practices. We base this upon findings from ethnographic fieldwork with people engaging manually with film-based photography. While automation liberates people from having to interact with various processes of photography, participants in our study reported a greater sense of control, richer experiences and opportunities for experimentation when they were able to engage manually with photographic processes

    Nondestructive measurement of the roughness of the inner surface of hollow core-photonic bandgap fibers

    No full text
    We present optical and atomic force microscopy measurements of the roughness of the core wall surface within a hollow core photonic bandgap fiber (HC-PBGF) over the [3×10-2 µm-1 to 30 µm-1] spatial frequency range. A recently developed immersion optical profilometry technique with picometer-scale sensitivity was used to measure the roughness of air-glass surfaces inside the fiber at unprecedentedly low spatial frequencies, which are known to have the highest impact on HC-PBGF scattering loss and, thus, determine their loss limit. Optical access to the inner surface of the core was obtained by the selective filling of the cladding holes with index matching liquid using techniques borrowed from micro-fluidics. Both measurement techniques reveal ultralow roughness levels exhibiting a 1/f spectral power density dependency characteristic of frozen surface capillary waves over a broad spatial frequency range. However, a deviation from this behavior at low spatial frequencies was observed for the first time, to the best of our knowledge

    Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions

    Get PDF
    Authenticated Diffie-Hellman key exchange allows two principals communicating over a public network, and each holding public /private keys, to agree on a shared secret value. In this paper we study the natural extension of this cryptographic problem to a group of principals. We begin from existing formal security models and refine them to incorporate major missing details (e.g., strong-corruption and concurrent sessions). Within this model we define the execution of a protocol for authenticated dynamic group Diffie-Hellman and show that it is provably secure under the decisional Diffie-Hellman assumption. Our security result holds in the standard model and thus provides better security guarantees than previously published results in the random oracle model
    • …
    corecore