909 resultados para computer-mediated communications
Distributed and compressed MIKEY mode to secure end-to-end communications in the Internet of things.
Resumo:
Multimedia Internet KEYing protocol (MIKEY) aims at establishing secure credentials between two communicating entities. However, existing MIKEY modes fail to meet the requirements of low-power and low-processing devices. To address this issue, we combine two previously proposed approaches to introduce a new distributed and compressed MIKEY mode for the Internet of Things. Indeed, relying on a cooperative approach, a set of third parties is used to discharge the constrained nodes from heavy computational operations. Doing so, the preshared mode is used in the constrained part of network, while the public key mode is used in the unconstrained part of the network. Furthermore, to mitigate the communication cost we introduce a new header compression scheme that reduces the size of MIKEY’s header from 12 Bytes to 3 Bytes in the best compression case. Preliminary results show that our proposed mode is energy preserving whereas its security properties are preserved untouched.
Resumo:
Trabalho de Projeto apresentado à ESEPF para obtenção do grau de Mestre em Ciências da Educação Área de especialização em Supervisão Pedagógica
Resumo:
The primary goals of this study are to: embed sustainable concepts of energy consumption into certain part of existing Computer Science curriculum for English schools; investigate how to motivate 7-to-11 years old kids to learn these concepts; promote responsive ICT (Information and Communications Technology) use by these kids in their daily life; raise their awareness of today’s ecological challenges. Sustainability-related ICT lessons developed aim to provoke computational thinking and creativity to foster understanding of environmental impact of ICT and positive environmental impact of small changes in user energy consumption behaviour. The importance of including sustainability into the Computer Science curriculum is due to the fact that ICT is both a solution and one of the causes of current world ecological problems. This research follows Agile software development methodology. In order to achieve the aforementioned goals, sustainability requirements, curriculum requirements and technical requirements are firstly analysed. Secondly, the web-based user interface is designed. In parallel, a set of three online lessons (video, slideshow and game) is created for the website GreenICTKids.com taking into account several green design patterns. Finally, the evaluation phase involves the collection of adults’ and kids’ feedback on the following: user interface; contents; user interaction; impacts on the kids’ sustainability awareness and on the kids’ behaviour with technologies. In conclusion, a list of research outcomes is as follows: 92% of the adults learnt more about energy consumption; 80% of the kids are motivated to learn about energy consumption and found the website easy to use; 100% of the kids understood the contents and liked website’s visual aspect; 100% of the kids will try to apply in their daily life what they learnt through the online lessons.
Resumo:
Health-risk information can elicit negative emotions like anticipated regret that may positively affect health persuasion. The beneficial impact of such emotions is undermined when target audiences respond defensively to the threatening information. We tested whether self-affirming (reflecting on cherished attributes) before message exposure can be used as strategy to enhance the experience of anticipated regret. Women were self-affirmed or not before exposure to a message promoting fruit and vegetable consumption. Self-affirmation increased anticipated regret and intentions reported following message exposure and consumption in the week after the intervention; regret mediated the affirmation effect on intentions. Moreover, results suggest that anticipated regret and intentions are serial mediators linking self-affirmation and behavior. By demonstrating the mediating role of anticipated regret, we provide insights into how self-affirmation may promote healthy intentions and behavior following health message exposure. Self-affirmation techniques could thus potentially be used to increase the effectiveness of health communication efforts.
Resumo:
Communications are important for relationships within a marketing channel from both a theoretical and managerial perspective. Yet it is a problematic area for scholars. Thus, this research addresses the problem of how do customers of a financial services institution perceive communications with an ideal institution? This study's case research methodology used in-depth interviews with 34 carefully selected customers of a building society. The factors that make up customers' attitudes about corporate communications for an ideal financial services institution were identified and actual perceptions were compared against that ideal. The findings confirmed the importance of communications for customers in a relationship with a financial services provider and suggested communication priorities for customers in this context. In addition, the findings suggested sources of communication dissatisfaction for customers. These findings build upon the literature that speculates about customer perceptions of communications with organizations but provides little evidence to support hypotheses. The contributions arose from the emphasis on the customers' own attitudes and the patterns found within them.
Resumo:
Bid opening in e-auction is efficient when a homomorphic secret sharing function is employed to seal the bids and homomorphic secret reconstruction is employed to open the bids. However, this high efficiency is based on an assumption: the bids are valid (e.g., within a special range). An undetected invalid bid can compromise correctness and fairness of the auction. Unfortunately, validity verification of the bids is ignored in the auction schemes employing homomorphic secret sharing (called homomorphic auction in this paper). In this paper, an attack against the homomorphic auction in the absence of bid validity check is presented and a necessary bid validity check mechanism is proposed. Then a batch cryptographic technique is introduced and applied to improve the efficiency of bid validity check.