448 resultados para Sim authentication messaggistica online
Resumo:
Digital signatures are often used by trusted authorities to make unique bindings between a subject and a digital object; for example, certificate authorities certify a public key belongs to a domain name, and time-stamping authorities certify that a certain piece of information existed at a certain time. Traditional digital signature schemes however impose no uniqueness conditions, so a trusted authority could make multiple certifications for the same subject but different objects, be it intentionally, by accident, or following a (legal or illegal) coercion. We propose the notion of a double-authentication-preventing signature, in which a value to be signed is split into two parts: a subject and a message. If a signer ever signs two different messages for the same subject, enough information is revealed to allow anyone to compute valid signatures on behalf of the signer. This double-signature forgeability property discourages signers from misbehaving---a form of self-enforcement---and would give binding authorities like CAs some cryptographic arguments to resist legal coercion. We give a generic construction using a new type of trapdoor functions with extractability properties, which we show can be instantiated using the group of sign-agnostic quadratic residues modulo a Blum integer.
Resumo:
1000 voices is an international web-based platform for gathering and displaying more than 1000 life stories about the lived experience of people with disability. The site contains life stories told by people with disability that are presented in multiple media and formats, including text, audio, video, graphics and visual art...
Resumo:
In this paper we tackle the problem of finding an efficient signature verification scheme when the number of signatures is signi.- cantly large and the verifier is relatively weak. In particular, we tackle the problem of message authentication in many-to-one communication networks known as concast communication. The paper presents three signature screening algorithms for a variant of ElGamal-type digital signatures. The cost for these schemes is n applications of hash functions, 2n modular multiplications, and n modular additions plus the verification of one digital signature, where n is the number of signatures. The paper also presents a solution to the open problem of finding a fast screening signature for non-RSA digital signature schemes.
Resumo:
Education in the 21st century demands a model for understanding a new culture of learning in the face of rapid change, open access data and geographical diversity. Teachers no longer need to provide the latest information because students themselves are taking an active role in peer collectives to help create it. This paper examines, through an Australian case study entitled ‘Design Minds’, the development of an online design education platform as a key initiative to enact a government priority for statewide cultural change through design-based curriculum. Utilising digital technology to create a supportive community, ‘Design Minds’ recognises that interdisciplinary learning fostered through engagement will empower future citizens to think, innovate, and discover. This paper details the participatory design process undertaken with multiple stakeholders to create the platform. It also outlines a proposed research agenda for future measurement of its value in creating a new learning culture, supporting regional and remote communities, and revitalising frontline services. It is anticipated this research will inform ongoing development of the online platform, and future design education and research programs in K-12 schools in Australia.
Resumo:
Background Engaging clients from the outset of psychotherapy is important for therapeutic success. However, there is little research evaluating therapists’ initial attempts to engage clients. This article reports retrospective analysis of data from a trial of online Cognitive Behavioural Therapy (CBT) for depression. Qualitative and quantitative methods were used to evaluate how therapists manage clients’ expectations at the outset of therapy and its relationship with client retention in the therapeutic intervention. Aims To develop a system to codify expectation management in initial sessions of online CBT and evaluate its relationship with retention. Method Initial qualitative research using conversation analysis identified three different communication practices used by therapists at the start of first sessions: no expectation management, some expectation management, and comprehensive expectation management. These findings were developed into a coding scheme that enabled substantial inter-rater agreement (weighted Kappa = 0.78; 95% CI: 0.52 to 0.94) and was applied to all trial data. Results Adjusting for a range of client variables, primary analysis of data from 147 clients found comprehensive expectation management was associated with clients remaining in therapy for 1.4 sessions longer than those who received no expectation management (95% CI: -0.2 to 3.0). This finding was supported by a sensitivity analysis including an additional 21 clients (1.6 sessions, 95% CI: 0.2 to 3.1). Conclusions Using a combination of qualitative and quantitative methods, this study suggests a relationship between expectation management and client retention in online CBT for depression, which has implications for professional practice. A larger prospective study would enable a more precise estimate of retention.
Resumo:
Background Engaging clients in psychotherapy by managing their expectations is important for therapeutic success. Initial moments in first sessions of therapy are thought to afford an opportunity to establish a shared understanding of how therapy will proceed. However there is little evidence from analysis of actual sessions of therapy to support this. Objective This study utilised recordings to examine how therapists manage clients’ expectations during the first two sessions of online Cognitive Behavioural Therapy (CBT). Methods Expectation management was investigated through conversation analysis of sessions from 176 client-therapist dyads involved in online CBT. The primary focus of analysis was expectation management during the initial moments of first sessions, with a secondary focus on expectations at subsequent points. Analysis Clients’ expectations for therapy were most commonly managed during the initial moments of first sessions of therapy. At this point, most therapists either outlined the tasks of the first and subsequent sessions (n=36), or the first session only (n=108). On other occasions (n = 32), no attempt was made to manage clients’ expectations by outlining what would happen in therapy. Observations of the interactional consequences of such an absence suggest clients may struggle to engage with the therapeutic process in the absence of appropriate expectation management by therapists. Conclusion Clients may more readily engage from the outset of therapy when provided with an explanation that manages their expectation of what is involved. Therapists can accomplish this by projecting how therapy will proceed, particularly beyond the initial session.
Resumo:
A parallel authentication and public-key encryption is introduced and exemplified on joint encryption and signing which compares favorably with sequential Encrypt-then-Sign (ɛtS) or Sign-then-Encrypt (Stɛ) schemes as far as both efficiency and security are concerned. A security model for signcryption, and thus joint encryption and signing, has been recently defined which considers possible attacks and security goals. Such a scheme is considered secure if the encryption part guarantees indistinguishability and the signature part prevents existential forgeries, for outsider but also insider adversaries. We propose two schemes of parallel signcryption, which are efficient alternative to Commit-then-Sign-and- Encrypt (Ct&G3&S). They are both provably secure in the random oracle model. The first one, called generic parallel encrypt and sign, is secure if the encryption scheme is semantically secure against chosen-ciphertext attacks and the signature scheme prevents existential forgeries against random-message attacks. The second scheme, called optimal parallel encrypt. and sign, applies random oracles similar to the OAEP technique in order to achieve security using encryption and signature components with very weak security requirements — encryption is expected to be one-way under chosen-plaintext attacks while signature needs to be secure against universal forgeries under random-plaintext attack, that is actually the case for both the plain-RSA encryption and signature under the usual RSA assumption. Both proposals are generic in the sense that any suitable encryption and signature schemes (i.e. which simply achieve required security) can be used. Furthermore they allow both parallel encryption and signing, as well as parallel decryption and verification. Properties of parallel encrypt and sign schemes are considered and a new security standard for parallel signcryption is proposed.
Resumo:
We study the multicast stream authentication problem when an opponent can drop, reorder and inject data packets into the communication channel. In this context, bandwidth limitation and fast authentication are the core concerns. Therefore any authentication scheme is to reduce as much as possible the packet overhead and the time spent at the receiver to check the authenticity of collected elements. Recently, Tartary and Wang developed a provably secure protocol with small packet overhead and a reduced number of signature verifications to be performed at the receiver. In this paper, we propose an hybrid scheme based on Tartary and Wang’s approach and Merkle hash trees. Our construction will exhibit a smaller overhead and a much faster processing at the receiver making it even more suitable for multicast than the earlier approach. As Tartary and Wang’s protocol, our construction is provably secure and allows the total recovery of the data stream despite erasures and injections occurred during transmission.
Resumo:
The session explores the potential for “Patron Driven Acquisition” (PDA) as a model for the acquisition of online video. Today, PDA has become a standard model of acquisition in the eBook market, more effectively aligning spend with use and increased return on investment (ROI). PDA is an unexplored model for acquisition of video, for which library collection development is complicated by higher storage and delivery costs, labor overheads for content selection and acquisition, and a dynamic film industry in which media and the technology that supports it is changing daily. Queensland University of Technology (QUT) and La Trobe University in Australia launched a research project in collaboration with Kanopy to explore the opportunity for PDA of video. The study relied on three data sources: (1) national surveys to compare the video purchasing and use practices of colleges, (2) on-campus pilot projects of PDA models to assess user engagement and behavior, and (3) testing of various user applications and features to support the model. The study incorporates usage statistics and survey data and builds upon a peer-reviewed research paper presented at the VALA 2014 conference in Melbourne, Australia. This session will be conducted by the researchers and will graphically present the results from the study. It will map out a future for video PDA, and how libraries can more cost-effectively acquire and maximize the discoverability of online video. The presenters will also solicit input and welcome questions from audience members.
Resumo:
This paper is concerned with how a localised and energy-constrained robot can maximise its time in the field by taking paths and tours that minimise its energy expenditure. A significant component of a robot's energy is expended on mobility and is a function of terrain traversability. We estimate traversability online from data sensed by the robot as it moves, and use this to generate maps, explore and ultimately converge on minimum energy tours of the environment. We provide results of detailed simulations and parameter studies that show the efficacy of this approach for a robot moving over terrain with unknown traversability as well as a number of a priori unknown hard obstacles.
Resumo:
This case study applied Weick's (1979) notion of sensemaking to support timely quality doctoral completion. Taking a socio-cultural perspective the paper explored how drivers can be applied to inform better fit (Durham, 1991). Global research themes, including growth in student numbers, timely completion and generation and distribution of research outcomes, are considered. It is argued that accessible and interactive web interfaces should be informed by quality assurance measures and key performance indicators. The contribution made is a better understanding of how phenomena and contexts can be applied to generate quality management of research training environments and research outcomes in universities.
Resumo:
This article outlines the research approach used in the international 1000 Voices Project. The 1000 Voices project is an interdisciplinary research and public awareness project that uses a customised online multimodal storytelling platform to explore the lives of people with disability internationally. Through the project, researchers and partners have encouraged diverse participants to select the modes of storytelling (e.g. images, text, videos and combinations thereof) that suit them best and to self-define what both ‘disability’ and ‘life story’ mean to them. The online reflective component of the approach encourages participants to organically and reflectively develop story events and revisions over time in ways that suit them and their emerging lives. This article provides a detailed summary of the project's theoretical and methodological development alongside suggestions for future development in social work and qualitative research.
Resumo:
This paper will report on the “wicked” problems encountered when designing an online course with bounded content in an unbounded learning environment. It will describe the dilemmas faced and decisions made by academics in an Australian university challenged by an institutional initiative to design radical, disruptive learning experiences making use of readily available online media. This bounded/unbounded environment demands new roles for instructors in adopting innovative pedagogies and teaching and learning strategies. It also creates changing and challenging roles for course designers as they deal with ill-defined parameters and unknown audiences. In this paper, we propose a novel methodology for making curricular decisions in ill-defined spaces.
Resumo:
Lave and Wenger’s legitimate peripheral participation is an important aspect of online learning environments. It is common for teachers to scaffold varying levels of online participation in Web 2.0 contexts, such as online discussion forums and blogs. This study argues that legitimate peripheral participation needs to be redefined in response to students’ decentralised multiple interactions and non-linear engagement in hyperlinked learning environments. The study examines students’ levels of participation in online learning through theories of interactivity, distinguishing between five levels of student participation in the context of a first-year university course delivered via a learning management system. The data collection was implemented through two instruments: i) a questionnaire about students’ interactivity perception in the online reflective learning (n = 238) and then ii) an open discussion on the reason for the diverse perceptions of interactivity (n = 34). The study findings indicate that student participants, other than those who were active, need high levels of teacher or moderator intervention, which better enables legitimate peripheral participation to occur in online learning contexts.