997 resultados para Sim authentication messaggistica online
Resumo:
Digital signatures are often used by trusted authorities to make unique bindings between a subject and a digital object; for example, certificate authorities certify a public key belongs to a domain name, and time-stamping authorities certify that a certain piece of information existed at a certain time. Traditional digital signature schemes however impose no uniqueness conditions, so a trusted authority could make multiple certifications for the same subject but different objects, be it intentionally, by accident, or following a (legal or illegal) coercion. We propose the notion of a double-authentication-preventing signature, in which a value to be signed is split into two parts: a subject and a message. If a signer ever signs two different messages for the same subject, enough information is revealed to allow anyone to compute valid signatures on behalf of the signer. This double-signature forgeability property discourages signers from misbehaving—a form of self-enforcement—and would give binding authorities like CAs some cryptographic arguments to resist legal coercion. We give a generic construction using a new type of trapdoor functions with extractability properties, which we show can be instantiated using the group of sign-agnostic quadratic residues modulo a Blum integer; we show an additional application of these new extractable trapdoor functions to standard digital signatures.
Resumo:
The research establishes a model for online learning centering on the needs of integrative knowledge practices. Through the metaphor of Constellations, the practice-based research explores the complexities of working within interdisciplinary learning contexts and the potential of tools such as the Folksonomy learning platform for providing necessary conceptual support.
Resumo:
Online dynamic load modeling has become possible with the availability of Static Voltage Compensator (SVC) and Phasor Measurement Unit (PMU) devices. The power of the load response to the small random bounded voltage fluctuations caused from SVC can be measured by PMU for modelling purposes. The aim of this paper is to illustrate the capability of identifying an aggregated load model from high voltage substation level in the online environment. The induction motor is used as the main test subject since it contributes the majority of the dynamic loads. A test system representing simple electromechanical generator model serving dynamic loads through the transmission network is used to verify the proposed method. Also, dynamic load with multiple induction motors are modeled to achieve a better realistic load representation.
Resumo:
The aim of this research was to identify the role of brand reputation in encouraging consumer willingness to provide personal data online, for the benefits of personalisation. This study extends on Malhotra, Kim and Agarwal’s (2004) Internet Users Information Privacy Concerns Model, and uses the theoretical underpinning of Social Contract Theory to assess how brand reputation moderates the relationship between trusting beliefs and perceived value (Privacy Calculus framework) with willingness to give personal information. The research is highly relevant as most privacy research undertaken to date focuses on consumer related concerns. Very little research exists examining the role of brand reputation and online privacy. Practical implications of this research include gaining knowledge as to how to minimise online privacy concerns; improve brand reputation; and provide insight on how to reduce consumer resistance to the collection of personal information and encourage consumer opt-in.
Resumo:
The aim of this project is to bring information on low chill stonefruit varieties to a user in a clear and friendly format to aid in that decision process. Low Chill Australia see this project as high priority for its members to be competitive by growing high quality, early season peach and nectarine fruit varieties. Data will be collated from grower surveys, breeder’s descriptions and literature, and entered into an Access Database and published on the web for stonefruit growers in tropical and sub-tropical regions across Australia. Links will be available from the Low Chill Australia and Summerfruit Australia websites.
Resumo:
This paper proposes a novel application of differential evolution to solve a difficult dynamic optimisation or optimal control problem. The miss distance in a missile-target engagement is minimised using differential evolution. The difficulty of solving it by existing conventional techniques in optimal control theory is caused by the nonlinearity of the dynamic constraint equation, inequality constraint on the control input and inequality constraint on another parameter that enters problem indirectly. The optimal control problem of finding the minimum miss distance has an analytical solution subject to several simplifying assumptions. In the approach proposed in this paper, the initial population is generated around the seed value given by this analytical solution. Thereafter, the algorithm progresses to an acceptable final solution within a few generations, satisfying the constraints at every iteration. Since this solution or the control input has to be obtained in real time to be of any use in practice, the feasibility of online implementation is also illustrated.
Resumo:
This paper suggests a scheme for classifying online handwritten characters, based on dynamic space warping of strokes within the characters. A method for segmenting components into strokes using velocity profiles is proposed. Each stroke is a simple arbitrary shape and is encoded using three attributes. Correspondence between various strokes is established using Dynamic Space Warping. A distance measure which reliably differentiates between two corresponding simple shapes (strokes) has been formulated thus obtaining a perceptual distance measure between any two characters. Tests indicate an accuracy of over 85% on two different datasets of characters.
Resumo:
Interactive identification keys for Australian smut fungi (Ustilaginomycotina and Pucciniomycotina, Microbotryales) and rust fungi (Pucciniomycotina, Pucciniales) are available online at http://collections.daff.qld.gov.au. The keys were built using Lucid software, and facilitate the identification of all known Australian smut fungi (317 species in 37 genera) and 100 rust fungi (from approximately 360 species in 37 genera). The smut and rust keys are illustrated with over 1,600 and 570 images respectively. The keys are designed to assist a wide range of end-users including mycologists, plant health diagnosticians, biosecurity scientists, plant pathologists, and university students. The keys are dynamic and will be regularly updated to include taxonomic changes and incorporate new detections, taxa, distributions and images. Researchers working with Australian smut and rust fungi are encouraged to participate in the on-going development and improvement of these keys.
Resumo:
This thesis examines whether the rules for of evidence, which were developed around paper over centuries, are adequate for the authentication of electronic evidence. The history of documentary evidence is examined, and the nature of electronic evidence is explored, particularly recent types of electronic evidence such as social media and 'the Cloud'. The old rules are then critically applied to the varied types of electronic evidence to determine whether or not these old rules are indeed adequate.
Resumo:
Purpose If owner-managers engage in management development activities then chances of success may be improved for small businesses. But small business owner-managers (SBOMs) are a difficult group to engage in management development activities. While practitioners worry about timing, content and location of development activities, the purpose of this paper is to examine what drives SBOMs to participate in an online discussion forum (ODF) as a form of management development. An ODF was run with SBOMs and the factors affecting their participation are reported from this exploratory study. Design/methodology/approach A qualitative methodology was used where data gathered from three sources, the ODF posts, in-depth interviews with participants and a focus group with non-participants. These were analysed to evaluate factors affecting participation of SBOMs in an ODF. Findings The findings point to the importance of owner-managers’ attitudes. Attitudes that positively affected SBOMs participation in the ODF included; appreciating that learning leads to business success; positive self-efficacy developed through prior online experience; and an occupational identity as a business manager. Research limitations/implications Few SBOMs participated in the ODF, which is consistent with research finding that they are a difficult group to engage in management development learning activities. Three forms of data were analysed to strengthen results. Practical implications Caution should be exercised when considering investment in e-learning to develop the managerial capabilities of SBOMs. Originality/value Evidence of the factors important for participation in an informal voluntary ODF. The findings suggest greater emphasis should be placed on changing attitudes if SBOMs are to be encouraged to participate in management development activities.
Resumo:
Employees and students in University of Helsinki use various services which require authentication. Some of these services require strong authentication. Traditionally this has been realized by meeting in person and presenting an official identification card. Some of these online services can be automatized by implementing existing techniques for strong authentication. Currently strong authentication is implemented by VETUMA-service. Mobile authentication is interesting alternative method. The purpose of this paper is to study the Mobile Signature Service technology and to find out the benefits and possibilities of its use for mobile authentication in University of Helsinki. Mobile authentication is suitable method for implementing strong authentication and for signing documents digitally. Mobile authentication can be used in many different ways in Helsinki university.
Resumo:
Online content services can greatly benefit from personalisation features that enable delivery of content that is suited to each user's specific interests. This thesis presents a system that applies text analysis and user modeling techniques in an online news service for the purpose of personalisation and user interest analysis. The system creates a detailed thematic profile for each content item and observes user's actions towards content items to learn user's preferences. A handcrafted taxonomy of concepts, or ontology, is used in profile formation to extract relevant concepts from the text. User preference learning is automatic and there is no need for explicit preference settings or ratings from the user. Learned user profiles are segmented into interest groups using clustering techniques with the objective of providing a source of information for the service provider. Some theoretical background for chosen techniques is presented while the main focus is in finding practical solutions to some of the current information needs, which are not optimally served with traditional techniques.
Resumo:
Online fraud is a global problem. Millions of individuals worldwide are losing money and experiencing the devastation associated with becoming a victim of online fraud. In 2014, Australians reported losses of $82 million as a result of online fraud to the Australian Competition and Consumer Commission (ACCC). Given that the ACCC is one of many agencies that receives victim complaints, and the extent of under‐reporting of online fraud, this figure is likely to represent only a fraction of the actual monetary losses incurred. The successful policing of online fraud is hampered by its transnational nature, the prevalence of false/stolen identities used by offenders, and a lack of resources available to investigate offences. In addition, police are restricted by the geographical boundaries of their own jurisdictions which conflicts with the lack of boundaries afforded to offenders by the virtual world. In response to this, Australia is witnessing the emergence of victim‐oriented policing approaches to counter online fraud victimisation. This incorporates the use of financial intelligence as a tool to proactively notify potential victims of online fraud. Using a variety of Australian examples, this paper documents the history to this new approach and considers the significance that such a shift represents to policing in a broader context. It also details the value that this approach can have to both victims and law enforcement agencies. Overall, it is argued that a victim‐oriented approach to policing online fraud can have substantial benefits to police and victims alike.
Resumo:
With enrolments in higher education becoming a competitive market, through the removal of caps in 2012, the equitable access to postgraduate education is raised. Postgraduate education, provided through higher education institutions, is an important aspect of career development for professionals. Professionals working outside of the metropolitan area are increasingly seeking postgraduate education opportunities that will be delivered online, at a distance. In this research study, data collected from the teaching profession, has culminated in a model that will ultimately improve access to professional learning. This research paper aims to highlight the important role that higher education providers play in the delivery of postgraduate education to professionals working in regional and remote areas of Australia. Although this paper focuses on the realm of education, the model of connectedness, where synchronous and asynchronous technologies are used, can be adapted and applied to any profession that requires equitable access to professional learning.