250,547 research outputs found
Flexible and Robust Privacy-Preserving Implicit Authentication
Implicit authentication consists of a server authenticating a user based on
the user's usage profile, instead of/in addition to relying on something the
user explicitly knows (passwords, private keys, etc.). While implicit
authentication makes identity theft by third parties more difficult, it
requires the server to learn and store the user's usage profile. Recently, the
first privacy-preserving implicit authentication system was presented, in which
the server does not learn the user's profile. It uses an ad hoc two-party
computation protocol to compare the user's fresh sampled features against an
encrypted stored user's profile. The protocol requires storing the usage
profile and comparing against it using two different cryptosystems, one of them
order-preserving; furthermore, features must be numerical. We present here a
simpler protocol based on set intersection that has the advantages of: i)
requiring only one cryptosystem; ii) not leaking the relative order of fresh
feature samples; iii) being able to deal with any type of features (numerical
or non-numerical).
Keywords: Privacy-preserving implicit authentication, privacy-preserving set
intersection, implicit authentication, active authentication, transparent
authentication, risk mitigation, data brokers.Comment: IFIP SEC 2015-Intl. Information Security and Privacy Conference, May
26-28, 2015, IFIP AICT, Springer, to appea
Capturing doping attitudes by self-report declarations and implicit assessment: a methodology study
BACKGROUND: Understanding athletes' attitudes and behavioural intentions towards performance enhancement is critical to informing anti-doping intervention strategies. Capturing the complexity of these attitudes beyond verbal declarations requires indirect methods. This pilot study was aimed at developing and validating a method to assess implicit doping attitudes using an Implicit Associations Test (IAT) approach. METHODS: The conventional IAT evaluation task (categorising 'good' and 'bad' words) was combined with a novel 'doping' versus 'nutrition supplements' category pair to create a performance-enhancement related IAT protocol (PE-IAT). The difference between average response times to 'good-doping' and 'bad-doping' combinations represents an estimate of implicit attitude towards doping in relation to nutritional supplements. 111 sports and exercise science undergraduates completed the PE-IAT, the Performance Enhancement Attitude Scale (PEAS) and answered questions regarding their beliefs about doping. RESULTS: Longer response times were observed in the mixed category discrimination trials where categories 'good' and 'doping' shared the same response key (compared to 'bad-doping' combination on the same key) indicating a less favourable evaluation of doping substances. The PE-IAT measure did not correlate significantly with the declared doping attitudes (r = .181, p = .142), indicating a predictable partial dissociation. Action-oriented self-report expressed stronger associations with PE-IAT: participants who declared they would consider using doping showed significantly less implicit negativity towards banned substances (U = 109.00, p = .047). Similarly, those who reported more lenient explicit attitudes towards doping or expressly supported legalizing it, showed less implicit negativity towards doping in the sample, although neither observed differences reached statistical significance (t = 1.300, p = .198, and U = 231.00, p = .319, respectively). Known-group validation strategy yielded mixed results: while competitive sport participants scored significantly lower than non-competitive ones on the PEAS (t = -2.71, p = .008), the two groups did not differ on PE-IAT (t = -.093, p = .926). CONCLUSION: The results suggest a potential of the PE-IAT method to capture undeclared attitudes to doping and predict behaviour, which can support targeted anti-doping intervention and related research. The initial evidence of validity is promising but also indicates a need for improvement to the protocol and stimulus material
Levy-Lieb principle: The bridge between the electron density of Density Functional Theory and the wavefunction of Quantum Monte Carlo
The constrained-search principle introduced by Levy and Lieb, is proposed as
a practical, though conceptually rigorous, link between Density Functional
Theory (DFT) and Quantum Monte Carlo (QMC). The resulting numerical protocol
realizes in practice the implicit key statement of DFT: "Given the three
dimensional electron density of the ground state of a system of N electrons
with external potential v(r) it is possible to find the corresponding
3N-dimensional wavefunction of ground state." From a numerical point of view,
the proposed protocol can be employed to speed up the QMC procedure by
employing DFT densities as a pre-selection criterion for the sampling of
wavefunctions.Comment: 9 pages, 1 figure, paper in press in Chemical Physics Letters, 201
Building self-optimized communication systems based on applicative cross-layer information
This article proposes the Implicit Packet Meta Header(IPMH) as a standard method to compute and represent common QoS properties of the Application Data Units (ADU) of multimedia streams using legacy and proprietary streams’ headers (e.g. Real-time Transport Protocol headers). The use of IPMH by mechanisms located at different layers of the communication architecture will allow implementing fine per-packet selfoptimization of communication services regarding the actual application requirements. A case study showing how IPMH is used by error control mechanisms in the context of wireless networks is presented in order to demonstrate the feasibility and advantages of this approach
Asynchronous sessions with implicit functions and messages
Session types are a well-established approach to ensuring protocol conformance and the absence of communication errors such as deadlocks in message passing systems. Haskell introduced implicit parameters, Scala popularised this feature and recently gave implicit types first-class status, yielding an expressive tool for handling context dependencies in a type-safe yet terse way. We ask: can type-safe implicit functions be generalised from Scala’s sequential setting to message passing computation? We answer this question in the affirmative by presenting the first concurrent functional language with implicit message passing. The key idea is to generalise the concept of an implicit function to an implicit message, its concurrent analogue. Our language extends Gay and Vasconcelos’s calculus of linear types for asynchronous sessions (LAST) with implicit functions and messages. We prove the resulting system sound by translation into LAST
Implementation of the i-GAME mechanism in IEEE 802.15.4 WPANs
This technical report describes the implementation details of the Implicit GTS Allocation Mechanism (i-GAME), for
the IEEE 802.15.4 protocol. The i-GAME was implemented in nesC/TinyOS for the CrossBow MICAz mote, over our
own implementation of the IEEE 802.15.4 protocol stack. This document provides the implementation details, including
a description of the i-GAME software interfaces
- …
