250,547 research outputs found

    Flexible and Robust Privacy-Preserving Implicit Authentication

    Full text link
    Implicit authentication consists of a server authenticating a user based on the user's usage profile, instead of/in addition to relying on something the user explicitly knows (passwords, private keys, etc.). While implicit authentication makes identity theft by third parties more difficult, it requires the server to learn and store the user's usage profile. Recently, the first privacy-preserving implicit authentication system was presented, in which the server does not learn the user's profile. It uses an ad hoc two-party computation protocol to compare the user's fresh sampled features against an encrypted stored user's profile. The protocol requires storing the usage profile and comparing against it using two different cryptosystems, one of them order-preserving; furthermore, features must be numerical. We present here a simpler protocol based on set intersection that has the advantages of: i) requiring only one cryptosystem; ii) not leaking the relative order of fresh feature samples; iii) being able to deal with any type of features (numerical or non-numerical). Keywords: Privacy-preserving implicit authentication, privacy-preserving set intersection, implicit authentication, active authentication, transparent authentication, risk mitigation, data brokers.Comment: IFIP SEC 2015-Intl. Information Security and Privacy Conference, May 26-28, 2015, IFIP AICT, Springer, to appea

    Capturing doping attitudes by self-report declarations and implicit assessment: a methodology study

    Get PDF
    BACKGROUND: Understanding athletes' attitudes and behavioural intentions towards performance enhancement is critical to informing anti-doping intervention strategies. Capturing the complexity of these attitudes beyond verbal declarations requires indirect methods. This pilot study was aimed at developing and validating a method to assess implicit doping attitudes using an Implicit Associations Test (IAT) approach. METHODS: The conventional IAT evaluation task (categorising 'good' and 'bad' words) was combined with a novel 'doping' versus 'nutrition supplements' category pair to create a performance-enhancement related IAT protocol (PE-IAT). The difference between average response times to 'good-doping' and 'bad-doping' combinations represents an estimate of implicit attitude towards doping in relation to nutritional supplements. 111 sports and exercise science undergraduates completed the PE-IAT, the Performance Enhancement Attitude Scale (PEAS) and answered questions regarding their beliefs about doping. RESULTS: Longer response times were observed in the mixed category discrimination trials where categories 'good' and 'doping' shared the same response key (compared to 'bad-doping' combination on the same key) indicating a less favourable evaluation of doping substances. The PE-IAT measure did not correlate significantly with the declared doping attitudes (r = .181, p = .142), indicating a predictable partial dissociation. Action-oriented self-report expressed stronger associations with PE-IAT: participants who declared they would consider using doping showed significantly less implicit negativity towards banned substances (U = 109.00, p = .047). Similarly, those who reported more lenient explicit attitudes towards doping or expressly supported legalizing it, showed less implicit negativity towards doping in the sample, although neither observed differences reached statistical significance (t = 1.300, p = .198, and U = 231.00, p = .319, respectively). Known-group validation strategy yielded mixed results: while competitive sport participants scored significantly lower than non-competitive ones on the PEAS (t = -2.71, p = .008), the two groups did not differ on PE-IAT (t = -.093, p = .926). CONCLUSION: The results suggest a potential of the PE-IAT method to capture undeclared attitudes to doping and predict behaviour, which can support targeted anti-doping intervention and related research. The initial evidence of validity is promising but also indicates a need for improvement to the protocol and stimulus material

    Levy-Lieb principle: The bridge between the electron density of Density Functional Theory and the wavefunction of Quantum Monte Carlo

    Full text link
    The constrained-search principle introduced by Levy and Lieb, is proposed as a practical, though conceptually rigorous, link between Density Functional Theory (DFT) and Quantum Monte Carlo (QMC). The resulting numerical protocol realizes in practice the implicit key statement of DFT: "Given the three dimensional electron density of the ground state of a system of N electrons with external potential v(r) it is possible to find the corresponding 3N-dimensional wavefunction of ground state." From a numerical point of view, the proposed protocol can be employed to speed up the QMC procedure by employing DFT densities as a pre-selection criterion for the sampling of wavefunctions.Comment: 9 pages, 1 figure, paper in press in Chemical Physics Letters, 201

    Building self-optimized communication systems based on applicative cross-layer information

    Get PDF
    This article proposes the Implicit Packet Meta Header(IPMH) as a standard method to compute and represent common QoS properties of the Application Data Units (ADU) of multimedia streams using legacy and proprietary streams’ headers (e.g. Real-time Transport Protocol headers). The use of IPMH by mechanisms located at different layers of the communication architecture will allow implementing fine per-packet selfoptimization of communication services regarding the actual application requirements. A case study showing how IPMH is used by error control mechanisms in the context of wireless networks is presented in order to demonstrate the feasibility and advantages of this approach

    Asynchronous sessions with implicit functions and messages

    Get PDF
    Session types are a well-established approach to ensuring protocol conformance and the absence of communication errors such as deadlocks in message passing systems. Haskell introduced implicit parameters, Scala popularised this feature and recently gave implicit types first-class status, yielding an expressive tool for handling context dependencies in a type-safe yet terse way. We ask: can type-safe implicit functions be generalised from Scala’s sequential setting to message passing computation? We answer this question in the affirmative by presenting the first concurrent functional language with implicit message passing. The key idea is to generalise the concept of an implicit function to an implicit message, its concurrent analogue. Our language extends Gay and Vasconcelos’s calculus of linear types for asynchronous sessions (LAST) with implicit functions and messages. We prove the resulting system sound by translation into LAST

    Implementation of the i-GAME mechanism in IEEE 802.15.4 WPANs

    Get PDF
    This technical report describes the implementation details of the Implicit GTS Allocation Mechanism (i-GAME), for the IEEE 802.15.4 protocol. The i-GAME was implemented in nesC/TinyOS for the CrossBow MICAz mote, over our own implementation of the IEEE 802.15.4 protocol stack. This document provides the implementation details, including a description of the i-GAME software interfaces
    corecore