946 resultados para messages
Resumo:
In this paper, we provide the results of a field study of a Ubicomp system called CAM (Cooperative Artefact Memory) in a Product Design studio. CAM is a mobile-tagging based messaging system that allows designers to store relevant information onto their design artefacts in the form of messages, annotations and external web links. From our field study results, we observe that the use of CAM adds another shared ‘space’ onto these design artefacts – that are in their natural settings boundary objects themselves. In the paper, we provide several examples from the field illustrating how CAM helps in the design process.
Resumo:
In this chapter, we discuss four related areas of cryptology, namely, authentication, hashing, message authentication codes (MACs), and digital signatures. These topics represent active and growing research topics in cryptology. Space limitations allow us to concentrate only on the essential aspects of each topic. The bibliography is intended to supplement our survey. We have selected those items which providean overview of the current state of knowledge in the above areas. Authentication deals with the problem of providing assurance to a receiver that a communicated message originates from a particular transmitter, and that the received message has the same content as the transmitted message. A typical authentication scenario occurs in computer networks, where the identity of two communicating entities is established by means of authentication. Hashing is concerned with the problem of providing a relatively short digest–fingerprint of a much longer message or electronic document. A hashing function must satisfy (at least) the critical requirement that the fingerprints of two distinct messages are distinct. Hashing functions have numerous applications in cryptology. They are often used as primitives to construct other cryptographic functions. MACs are symmetric key primitives that provide message integrity against active spoofing by appending a cryptographic checksum to a message that is verifiable only by the intended recipient of the message. Message authentication is one of the most important ways of ensuring the integrity of information that is transferred by electronic means. Digital signatures provide electronic equivalents of handwritten signatures. They preserve the essential features of handwritten signatures and can be used to sign electronic documents. Digital signatures can potentially be used in legal contexts.
Resumo:
In this chapter we continue the exposition of crypto topics that was begun in the previous chapter. This chapter covers secret sharing, threshold cryptography, signature schemes, and finally quantum key distribution and quantum cryptography. As in the previous chapter, we have focused only on the essentials of each topic. We have selected in the bibliography a list of representative items, which can be consulted for further details. First we give a synopsis of the topics that are discussed in this chapter. Secret sharing is concerned with the problem of how to distribute a secret among a group of participating individuals, or entities, so that only predesignated collections of individuals are able to recreate the secret by collectively combining the parts of the secret that were allocated to them. There are numerous applications of secret-sharing schemes in practice. One example of secret sharing occurs in banking. For instance, the combination to a vault may be distributed in such a way that only specified collections of employees can open the vault by pooling their portions of the combination. In this way the authority to initiate an action, e.g., the opening of a bank vault, is divided for the purposes of providing security and for added functionality, such as auditing, if required. Threshold cryptography is a relatively recently studied area of cryptography. It deals with situations where the authority to initiate or perform cryptographic operations is distributed among a group of individuals. Many of the standard operations of single-user cryptography have counterparts in threshold cryptography. Signature schemes deal with the problem of generating and verifying electronic) signatures for documents.Asubclass of signature schemes is concerned with the shared-generation and the sharedverification of signatures, where a collaborating group of individuals are required to perform these actions. A new paradigm of security has recently been introduced into cryptography with the emergence of the ideas of quantum key distribution and quantum cryptography. While classical cryptography employs various mathematical techniques to restrict eavesdroppers from learning the contents of encrypted messages, in quantum cryptography the information is protected by the laws of physics.
Resumo:
In this paper, we propose a new blind steganalytic method to detect the presence of secret messages embedded in black and white images using the steganographic techniques. We start by extracting several sets of matrix, such as run length matrix, gap length matrix and pixel difference. We also apply characteristic function on these matrices to enhance their discriminative capabilities. Then we calculate the statistics which include mean, variance, kurtosis and skewness to form our feature sets. The presented empirical works demonstrate our proposed method can effectively detect three different types of steganography. This proves the universality of our proposed method as a blind steganalysis. In addition, the experimental results show our proposed method is capable of detecting small amount of the embedded message.
Resumo:
Providing culturally appropriate health communication tools at a community level, whilst meeting funding objectives set by Government led initiatives, can be challenging. Literature states that a translational research framework fostering community communication can encourage the development of appropriate communication tools to facilitate transfer of health information between community and researchers. Reflections from initial Need for Feed cooking and nutrition education program trials in remote Indigenous communities across Cape York indicated program resources were neither meeting community nor researchers needs. In response, a translational research framework was modelled with collaborative partnerships formed between researchers and community with the aim of modifying current resources. Local working groups were established to facilitate communication and guide continual remodelling and retrial of resources for successive programs. Feedback from working groups indicated community members wanted resources with more pictures and less words. Partnership with Chronic Disease Resources Online (CDRO) led to the development of pictorial resources including 3 evaluation tools, 27 recipe sets and 10 education support materials. Between June to December 2012 resources were trialled across 4 Cape York communities with 69 school aged children and 4 community elders. Qualitative data has indicated high satisfaction with modified pictorial resources, proving pictorial resources to be an effective and culturally appropriate method to both communicate health messages to community and facilitate flow of evaluation data to researchers. A translational research framework fostering communication between community and researchers can potentially enhance the quality of health communication tools.
Resumo:
This paper discusses the Townsville City Council Dry Tropics Water Smart (DTWS) initiative, developed by TCC Integrated Sustainability Services (ISS) and Townsville Water, and informed by The University of Adelaide. The program draws on many years of experience by the TCC team to blend key community-based research approaches in order to develop this residential outdoor water conservation program. Several community pilots have been conducted to test different behaviour change strategies and messages. This paper outlines recent steps taken to develop the community trials, as guided by a combination of behaviour change theories including community-based social marketing and thematic communications methods. Some preliminary results are outlined focused on community uptake of different strategies, community perceptions of communication materials, and some insights into the effectiveness of outdoor water hardware.
Resumo:
Objective To investigate how and when changes in workplace sitting time occurred following a workplace intervention to inform evaluation of intervention success. Method The 4-week Stand Up Comcare study (June–September 2011) aimed to reduce workplace sitting time via regularly interrupting and replacing sitting time throughout the day. Activity monitor (activPAL3) workplace data from control (n=22) and intervention participants (n=21) were analysed. Differences in the number and usual duration of sitting bouts were used to evaluate how change occurred. To examine when change occurred, intervention effects were compared by hour since starting work and hour of the workday. Change in workplace activity (sitting, standing, stepping) was examined to further inform alignment with intervention messages. Individual variability was examined in how and when the change occurred. Results Overall, behavioural changes aligned with intervention aims. All intervention participants reduced total workplace sitting time, though there was wide individual variability observed (range −29 to −262 min per 8 h workday). On average, intervention participants reduced number of sitting bouts (−4.6 bouts (95% CI −10.1 to 1.0), p=0.106) and usual sitting bout duration (−5.6 min (95% CI −9.8 to −1.4, p=0.011)) relative to controls. Sitting time reductions were observed across the workday, though intervention effects varied by hour of the day (p=0.015). The intervention group successfully adopted the Stand Up and Sit Less intervention messages across the day. Conclusion These analyses confirmed that this workplace intervention successfully modified sitting behaviour as intended (ie, fewer and shorter sitting bouts, with changes occurring throughout the day).
Resumo:
Up to 30% of young people drink at risky levels at least weekly. Yet, many do not view their alcohol use as problematic and focus only on its enjoyment and socialization benefits. Innovative, youth-friendly and highly accessible ways of delivering preventative health messages are required. This paper describes the design, development and prototype testing of ‘Ray’s Night Out’ a new iPhone application for promoting harm minimisation and controlled drinking strategies in young people. Two participatory design workshops were conducted with 5 young people to explore how technology could be used to enhance a good night out drinking. Four existing iPhone alcohol apps were reviewed. Five young people conducted initial prototype testing to refine app content and interface design. Final prototype testing was conducted with 10 young people. Prototype testing indicated young people had a very positive response to the Ray animated character and rated the app highly on aesthetics, engagement, content, functionality, usefulness and youth relevance. The Ray app provides a youth friendly approach to addressing alcohol misuse in young people. The impact of the Ray app on young people’s alcohol use knowledge, attitudes and behaviours is currently being evaluated.
Resumo:
The paper presents a participatory design research framework as a primary method for structuring youth engagement, participation and contribution to the design, development and usability evaluation of three evidencebased e-tools for wellbeing, which include smart phone mobile apps as well as e-health websites. The three projects are part of a series of six e-tools part of Safe and Supportive program under Young and Well CRC. The participatory design method, developed by Zelenko (2012) for application in design of online health promoting technologies, was further piloted in partnership with Inspire USA for specific application within the CRC, deploying a combination of creative design workshops and speculative design activities in developing e-tool prototypes with young people. This paper presents the resulting participatory research framework as it was implemented across the e-tool projects to facilitate active youth participation in co-designing the e-tools and ensuring the final designs are relevant to young people and deliver health messages in engaging ways. The principles of Participatory Design (PD) that inform the new framework include a high degree of participant agency in creative decisionmaking and a commitment to the process of co-designing, with young people working alongside designers and developers. The paper will showcase how the PD framework was applied across three projects to increase young people’s contribution to final design outcome.
Resumo:
Research Background: The proliferation of technologically-based interventions and mHealth in particular have led to a need for innovative, relevant and engaging ways of presenting health messages to young people using technology. ‘Ray’s Night Out’ is a mobile health application co-designed with young people by an interdisciplinary team of researchers at Queensland University of Technology. Research Questions: The design, research, development and evaluation of ‘Ray’s Night Out’ addressed a number of research questions from across the fields of Psychology and Interactive and Visual Design. The specific design research questions addressed were: How can a mobile intervention be best designed to promote young people’s safety and wellbeing and minimise harm when consuming alcohol on a typical night out? Specifically, how can principles of interactive and visual design be effectively applied to develop innovative digital health communication solutions that empower young people as active participants in improving their health and wellbeing? Research Contribution: Innovation The mobile app, as a digital artifact, represents a new way of engaging young people in the issue of alcohol consumption and the pacing and self-care behaviours through unique interaction, visual and interface designs which resulted from the participant-led and iterative design research process. The design of the specific interactive and visual features of the app informed by participatory design data and by health research present a novel approach to preventing young people in crossing the ‘stupid line’ on a typical night out. Research Significance: The significance of the design research component within the larger interdisciplinary practices that have informed ‘Ray’s Night Out’ (e.g. field of psychology, reported through journal articles and other related outcomes), is the unique visual and interactive presentation of participant data and health concepts within the app interface and interaction design which improves and increases young people’s engagement with the health messages it contains. The global quality standard is further demonstrated by the launch on Apple iTunes: https://itunes.apple.com/us/app/rays-night-out/id978589497?mt=8 This demonstrates the application meets the high professional requirements for global release and international standards set by Apple AppStore.
Resumo:
Research Background Young people’s avid use of mobile technologies in daily life has led to an increase in the design and research on mHealth (mobile health) interventions targeting young people. ‘Music eScape’ is a mobile based mood regulation app that uses an innovative approach to promoting young people’s wellbeing using music. Research Question The design, research, development and evaluation of ‘Music eScape’ addressed a number of research questions from across the fields of Psychology and Interactive and Visual Design. The specific design research question addressed was: How can interaction and visual design be utilized to promote and enable young people to effectively regulate their mood using music and how can the new design further promote their experience of empowerment, control and agency over actively directing their mood journey? Research Contribution Innovation and New Knowledge Through its unique visual interface design and interactivity, the application presents a novel approach to promoting young people’s wellbeing using music and a specific function that allows users to ‘draw’ their mood journey in order to generate a playlist. The mobile app is the first to contain a function that enables users to plan their mood journey and exercise a sense of agency, intentional choice and control over the mood shift and by extension, their wellbeing. The feature ‘drawing’ interface was designed by Oksana Zelenko using participatory design research and Russell’s circumplex model of affect (1980) to inform the key visual design concept and underpinning interaction design. Research Significance The significance of the design research component within the larger interdisciplinary practices that have informed ‘Music eScape’ (e.g. field of psychology, reported through journal articles and other related outcomes), is the unique visual and interactive presentation of participant data and music therapy research within the app interface and interaction design which improves and increases young people’s engagement with the health messages it contains. The industry quality standard is further demonstrated by the launch on Apple iTunes. This demonstrates the application meets the high professional requirements for national release and meets international standards. The app also creates a new benchmark for the quality of health apps on the market as it marks the industry release of a trialled evidence-based mHealth intervention co-designed with young people.
Resumo:
Digital signatures are often used by trusted authorities to make unique bindings between a subject and a digital object; for example, certificate authorities certify a public key belongs to a domain name, and time-stamping authorities certify that a certain piece of information existed at a certain time. Traditional digital signature schemes however impose no uniqueness conditions, so a trusted authority could make multiple certifications for the same subject but different objects, be it intentionally, by accident, or following a (legal or illegal) coercion. We propose the notion of a double-authentication-preventing signature, in which a value to be signed is split into two parts: a subject and a message. If a signer ever signs two different messages for the same subject, enough information is revealed to allow anyone to compute valid signatures on behalf of the signer. This double-signature forgeability property discourages signers from misbehaving---a form of self-enforcement---and would give binding authorities like CAs some cryptographic arguments to resist legal coercion. We give a generic construction using a new type of trapdoor functions with extractability properties, which we show can be instantiated using the group of sign-agnostic quadratic residues modulo a Blum integer.
Resumo:
In this paper we analyse the role of some of the building blocks of SHA-256. We show that the disturbance-correction strategy is applicable to the SHA-256 architecture and we prove that functions Σ, σ are vital for the security of SHA-256 by showing that for a variant without them it is possible to find collisions with complexity 2^64 hash operations. As a step towards an analysis of the full function, we present the results of our experiments on Hamming weights of expanded messages for different variants of the message expansion and show that there exist low-weight expanded messages for XOR-linearised variants.
Resumo:
Standard signature schemes are usually designed only to achieve weak unforgeability – i.e. preventing forgery of signatures on new messages not previously signed. However, most signature schemes are randomised and allow many possible signatures for a single message. In this case, it may be possible to produce a new signature on a previously signed message. Some applications require that this type of forgery also be prevented – this requirement is called strong unforgeability. At PKC2006, Boneh Shen and Waters presented an efficient transform based on any randomised trapdoor hash function which converts a weakly unforgeable signature into a strongly unforgeable signature and applied it to construct a strongly unforgeable signature based on the CDH problem. However, the transform of Boneh et al only applies to a class of so-called partitioned signatures. Although many schemes fall in this class, some do not, for example the DSA signature. Hence it is natural to ask whether one can obtain a truly generic efficient transform based on any randomised trapdoor hash function which converts any weakly unforgeable signature into a strongly unforgeable one. We answer this question in the positive by presenting a simple modification of the Boneh-Shen-Waters transform. Our modified transform uses two randomised trapdoor hash functions.
Resumo:
Weaving sections, a common design of motorways, require extensive lane-change manoeuvres. Numerous studies have found that drivers tend to make their lane changes as soon as they enter the weaving section, as the traffic volume increases. Congestion builds up as a result of this high lane-changing concentration. Importantly, such congestion also limits the use of existing infrastructure, the weaving section downstream. This behaviour thus affects both safety and operational aspects. The potential tool for managing motorways effectively and efficiently is cooperative intelligent transport systems (C-ITS). This research investigates a lane-change distribution advisory application based on C-ITS for weaving vehicles in weaving sections. The objective of this research is to alleviate the lane-changing concentration problem by coordinating weaving vehicles to ensure that such lane-changing activities are evenly distributed over the existing weaving length. This is achieved by sending individual messages to drivers based on their location to advise them when to start their lane change. The research applied a microscopic simulation in AIMSUN to evaluate the proposed strategy’s effectiveness in a one-sided ramp weave. The proposed strategy was evaluated using different weaving advisory proportions, traffic demands and penetration rates. The evaluation revealed that the proposed lane-changing advisory has the potential to significantly improve delay.