Searched for: mods_originInfo_publisher_s%3A%22Springer%22
(61 - 80 of 1,391)

Pages

document
Wang, Xingkai (author), Cao, Zhenfu (author), LIU, Z. (author), Liang, K. (author)
Gordon et al. (TCC 2015) systematically studied the security of Multi-client Verifiable Computation (MVC), in which a set of computationally-weak clients outsource the computation of a general function f over their private inputs to an untrusted server. They introduced the universally composable (UC) security of MVC and proposed a scheme...
conference paper 2022
document
Cardaioli, Matteo (author), Conti, M. (author), Ravindranath, A. (author)
Voice messages are an increasingly popular method of communication, accounting for more than 200 million messages a day. Sending audio messages requires a user to invest lesser effort than texting while enhancing the message’s meaning by adding an emotional context (e.g., irony). Unfortunately, we suspect that voice messages might provide...
conference paper 2022
document
Chen, H. (author), Fu, S. (author), Liang, K. (author)
Updatable encryption (UE) enables the cloud server to update the previously sourced encrypted data to a new key with only an update token received from the client. Two interesting works have been proposed to clarify the relationships among various UE security notions. Jiang (ASIACRYPT 2020) proved the equivalence of every security notion in...
conference paper 2022
document
Guo, Peicheng (author), Smit, I.R. (author)
With the development of Artificial intelligence, the connected objects are extended with the predictive capabilities and the character of things can change to “things that predict”. If a connected device is able to embrace a predictive system that not only profiles for scripted behavior but could also use the knowledge co-created by all the...
conference paper 2022
document
Faragau, A.B. (author), Metrikine, A. (author), van Dalen, K.N. (author)
Hyperloop is an emerging high-speed transportation system in which air resistance is minimised by having the vehicle travel inside a de-pressurised tube supported by columns. This design leads to a strong periodic variation of the stiffness (among other parameters) experienced by the vehicle. Also, along its route, the Hyperloop will encounter...
conference paper 2022
document
Vos, J.V. (author), Vos, D.A. (author), Erkin, Z. (author)
Cloud services are an essential part of our digital infrastructure as organizations outsource large amounts of data storage and computations. While organizations typically keep sensitive data in encrypted form at rest, they decrypt it when performing computations, leaving the cloud provider free to observe the data. Unfortunately, access to...
conference paper 2022
document
Swaminathan, Sudharshan (author), Chmielewski, Łukasz (author), Perin, G. (author), Picek, S. (author)
Side-channel attacks (SCA) focus on vulnerabilities caused by insecure implementations and exploit them to deduce useful information about the data being processed or the data itself through leakages obtained from the device. There have been many studies exploiting these leakages, and most of the state-of-the-art attacks have been shown to...
conference paper 2022
document
Lambregts, Steven (author), Chen, H. (author), Ning, Jianting (author), Liang, K. (author)
Searchable Encryption schemes provide secure search over encrypted databases while allowing admitted information leakages. Generally, the leakages can be categorized into access and volume pattern. In most existing SE schemes, these leakages are caused by practical designs but are considered an acceptable price to achieve high search...
conference paper 2022
document
Koffas, S. (author), Vadnala, Praveen Kumar (author)
We investigate the influence of clock frequency on the success rate of a fault injection attack. In particular, we examine the success rate of voltage and electromagnetic fault attacks for varying clock frequencies. Using three different tests that cover different components of a System-on-Chip, we perform fault injection while its CPU...
conference paper 2022
document
Zheng, Yubo (author), Xu, Peng (author), Wang, Wei (author), Chen, Tianyang (author), Susilo, Willy (author), Liang, K. (author), Jin, Hai (author)
Many practical secure systems have been designed to prevent real-world attacks via maximizing the attacking cost so as to reduce attack intentions. Inspired by this philosophy, we propose a new concept named delay encryption with keyword search (DEKS) to resist the notorious keyword guessing attack (KGA), in the context of secure cloud-based...
conference paper 2022
document
de Moor, Aldo (author), Papalioura, Evi (author), Taka, Evi (author), Rapti, Dora (author), Wolff, Annika (author), Knutas, Antti (author), te Velde, T. (author), Mulder, I. (author)
Wicked societal problems, such as environmental issues and climate<br/>change, are complex, networked problems involving numerous intertwined issues,no optimal solutions, and a wide range of stakeholders. Cities are problem owners and living labs for finding solutions through design-enabled innovation initiatives. However, to reach collective...
conference paper 2022
document
Dikken, O.D.F. (author), Limbu, B.H. (author), Specht, M.M. (author)
It takes considerable time, experience, and direct assistance from teachers to become a skilled writer. Handwriting fluency is one of the predictors of writing quality among students. However, students do not receive enough teacher supervision as a beginner to develop handwriting fluency in a proper manner. The ``Calligraphy tutor'' presented in...
conference paper 2022
document
Li, Meng (author), Zhang, Mingwei (author), Gao, Jianbo (author), Lal, C. (author), Conti, M. (author), Alazab, Mamoun (author)
Location-Based Services (LBSs) depend on a Service Provider (SP) to store data owners’ geospatial data and to process data users’ queries. For example, a Yelp user queries the SP to retrieve the k nearest Starbucks by submitting her/his current location. It is well-acknowledged that location privacy is vital to users and several prominent...
conference paper 2022
document
Chaudhary, Shivam (author), Pandey, Pankaj (author), Miyapuram, Krishna Prasad (author), Lomas, J.D. (author)
In the modern world, it is easy to get lost in thought, partly because of the vast knowledge available at our fingertips via smartphones that divide our cognitive resources and partly because of our intrinsic thoughts. In this work, we aim to find the differences in the neural signatures of mind-wandering and meditation that are common across...
conference paper 2022
document
Moerman, Andreas (author), van Bel, Nikki (author), Oesterholt, Frank (author), de Laat, Vincent (author), Blokker, E.J.M. (author)
Climate change demands for sustainable options for heating and cooling of buildings. Low-temperature thermal energy can be abstracted from the drinking water distribution system (DWDS); this is called thermal energy from drinking water (TED). The possible use of TED as a secondary function of the DWDS raises the question whether this...
book chapter 2022
document
Abbink, D.A. (author), Hao, Peng (author), Laval, Jorge (author), Shalev-Shwartz, Shai (author), Wu, Cathy (author), Yang, Terry (author), Hamdar, Samer (author), Chen, Danjue (author), Xie, Yuanchang (author), Li, Xiaopeng (author), Haque, Mohaiminul (author)
This chapter summarizes the presentations of speakers addressing such issues during the Automated Vehicles Symposium 2020 (AVS20) held virtually on July 27–30, 2020. These speakers participated in the break-out session titled “Artificial Intelligence for Automated Vehicle Control and Traffic Operations: Challenges and Opportunities”. The...
book chapter 2022
document
Murgia, Emiliana (author), Landoni, Monica (author), Huibers, Theo (author), Pera, M.S. (author)
In this manuscript, we discuss the findings from an introductory survey conducted with more than 50 teachers in Italy. We inquired about teachers’ opinions of educational technology used in the classroom, in particular search tools. Qualitative and quantitative data inferred from collected responses provide us with a multifaceted picture of...
conference paper 2022
document
Rezaeezade, A. (author), Perin, G. (author), Picek, S. (author)
Profiling side-channel analysis allows evaluators to estimate the worst-case security of a target. When security evaluations relax the assumptions about the adversary’s knowledge, profiling models may easily be sub-optimal due to the inability to extract the most informative points of interest from the side-channel measurements. When used for...
conference paper 2022
document
Müller, Jan U. (author), Weinmann, M. (author), Klein, Reinhard (author)
We propose an efficient and GPU-accelerated sampling framework which enables unbiased gradient approximation for differentiable point cloud rendering based on surface splatting. Our framework models the contribution of a point to the rendered image as a probability distribution. We derive an unbiased approximative gradient for the rendering...
conference paper 2022
document
Kulhánek, Jonáš (author), Derner, Erik (author), Sattler, Torsten (author), Babuska, R. (author)
Novel view synthesis is a long-standing problem. In this work, we consider a variant of the problem where we are given only a few context views sparsely covering a scene or an object. The goal is to predict novel viewpoints in the scene, which requires learning priors. The current state of the art is based on Neural Radiance Field (NeRF), and...
conference paper 2022
Searched for: mods_originInfo_publisher_s%3A%22Springer%22
(61 - 80 of 1,391)

Pages