Now showing items 41-60 of 109

    • Goalkeeper: A Zero-Sum Exergame for Motivating Physical Activity 

      Niforatos, Evangelos; Tran, Camilla; Pappas, Ilias; Giannakos, Michail (Peer reviewed; Journal article, 2021)
      Incentives and peer competition have so far been employed independently for increasing physical activity. In this paper, we introduce Goalkeeper, a mobile application that utilizes deposit contracts for motivating physical ...
    • Hierarchical Identity-Based Encryption with Tight Multi-challenge Security 

      Langrehr, Roman; Pan, Jiaxin (Peer reviewed; Journal article, 2020)
      We construct the first hierarchical identity-based encryption (HIBE) scheme with tight adaptive security in the multi-challenge setting, where adversaries are allowed to ask for ciphertexts for multiple adaptively chosen ...
    • Highly Efficient Key Exchange Protocols with Optimal Tightness 

      Cohn-Gordon, Katriel; Cremers, Cas; Gjøsteen, Kristian; Jacobsen, Håkon; Jager, Tibor (Journal article; Peer reviewed, 2019)
      In this paper we give nearly tight reductions for modern implicitly authenticated Diffie-Hellman protocols in the style of the Signal and Noise protocols, which are extremely simple and efficient. Unlike previous approaches, ...
    • How Quickly Can We Predict Users’ Ratings on Aesthetic Evaluations of Websites? Employing Machine Learning on Eye-Tracking Data 

      Pappas, Ilias; Sharma, Kshitij; Mikalef, Patrick; Giannakos, Michail (Peer reviewed; Journal article, 2020)
      Abstract. This study examines how quickly we can predictusers’ ratings on vis-ual aesthetics in terms of simplicity, diversity, colorfulness, craftsmanship.To predict users’ ratings, first we capturegaze behaviorwhile ...
    • Human-Human Communication in Cyber Threat Situations: A Systematic Review 

      Ask, Torvald Fossåen; Lugo, Ricardo Gregorio; Knox, Benjamin James; Sütterlin, Stefan (Peer reviewed; Journal article, 2021)
      In cyber threat situations, decision-making processes within organizations and between the affected organization and external entities are high-stake. They require human communication entailing technical complexity, time ...
    • Improvements in Everlasting Privacy: Efficient and Secure Zero Knowledge Proofs 

      Haines, Thomas Edmund; Gritti, Clementine Jeanne Pierrette (Journal article; Peer reviewed, 2019)
      Verifiable electronic voting promises to ensure the correctness of elections even in the presence of a corrupt authority, while providing strong privacy guarantees. However, few practical systems with end-to-end verifiability ...
    • Improving the Analysis of GPC in Real-Time Calculus 

      Tang, Yue; Jiang, Yuming; Guan, Nan (Journal article; Peer reviewed, 2019)
      Real-Time Calculus (RTC) is a framework for modeling and performance analysis of real-time networked systems. In RTC, workload and resources are modeled as arrival and service curves, and processing semantics are modeled ...
    • In-Service Teacher Training and Self-efficacy 

      Jørgen, Thorsnes; Rouhani, Majid; Divitini, Monica (Peer reviewed; Journal article, 2020)
      Programming is increasingly introduced in secondary schools, both as a stand-alone subject or integrated into other subjects, leading to growing attention to the training of in-service teachers. Teachers need to learn both ...
    • Individual Deep Fake Recognition Skills are Affected by Viewer’s Political Orientation, Agreement with Content and Device Used 

      Sütterlin, Stefan; Ask, Torvald Fossåen; Mägerle, Sophia; Glöckler, Sandra; Wolf, Leandra; Schray, Julian; Chandi, Alava; Bursac, Teodora; Khodabakhsh, Ali; Knox, Benjamin James; Canham, Matthew; Lugo, Ricardo Gregorio (Peer reviewed; Journal article, 2023)
      AI-generated “deep fakes” is increasingly used by cybercriminals conducting targeted and tailored social engineering attacks, and for influencing public opinion. To raise awareness and efficiently train individuals in ...
    • An Information Systems Design Theory for Digital Broker Platforms 

      Bley, Katja; Hentschel, Raoul; Pappas, Ilias (Peer reviewed; Journal article, 2022)
      Service platforms are becoming dominant drivers of daily business operations in a digitalized environment. Research focuses on technological and network effects of such platforms, while socio-technical opportunities remain ...
    • Investigating Aid Effectiveness in Developing Countries: The Case of Nepal 

      Karki, Yashoda; Pappas, Ilias (Peer reviewed; Journal article, 2020)
      Foreign aid serves as an important source of capital for any developing or under-developed country. It is very important to see how the recipient country can utilize this aid in the economic upliftment of the nation. Taking ...
    • Is a Smarter Grid Also Riskier? 

      Bernsmed, Karin; Jaatun, Martin Gilje; Frøystad, Christian (Journal article; Peer reviewed, 2019)
      The smart grid evolution digitalizes the traditional power distribution grid, by integrating information communication technology into its operation and control. A particularly interesting challenge is the integration of ...
    • Lattice-Based Authenticated Key Exchange with Tight Security 

      Pan, Jiaxin; Wagner, Benedikt; Zeng, Runzhi (Peer reviewed; Journal article, 2023)
      We construct the first tightly secure authenticated key exchange (AKE) protocol from lattices. Known tight constructions are all based on Diffie-Hellman-like assumptions. Thus, our protocol is the first construction with ...
    • Lattice-Based Proof of Shuffle and Applications to Electronic Voting 

      Aranha, Diego F.; Baum, Carsten; Gjøsteen, Kristian; Silde, Tjerand; Tunge, Thor (Peer reviewed; Journal article, 2021)
      A verifiable shuffle of known values is a method for proving that a collection of commitments opens to a given collection of known messages, without revealing a correspondence between commitments and messages. We propose ...
    • Lattice-Based Signatures with Tight Adaptive Corruptions and More 

      Pan, Jiaxin; Wagner, Benedikt (Peer reviewed; Journal article, 2022)
      We construct the first tightly secure signature schemes in the multi-user setting with adaptive corruptions from lattices. In stark contrast to the previous tight constructions whose security is solely based on number-theoretic ...
    • Lazy learned screening for efficient recruitment 

      Espernakk, Erik; Knaldstad, Magnus Johan; Kofod-Petersen, Anders (Peer reviewed; Journal article, 2019)
      The transition from traditional paper based systems for recruitment to the internet has resulted in companies in getting a lot more applications. A majority of these applications are often unstructured documents sent over ...
    • Learning Hamiltonian Systems with Mono-Implicit Runge-Kutta Methods 

      Myhr, Håkon Noren (Journal article, 2023)
      Numerical integrators could be used to form interpolation conditions when training neural networks to approximate the vector field of an ordinary differential equation (ODE) from data. When numerical one-step schemes such ...
    • Learning multi-granularity dynamic network representations for social recommendation 

      Liu, Peng; Zhang, Lemei; Gulla, Jon Atle (Journal article; Peer reviewed, 2019)
      With the rapid proliferation of online social networks, personalized social recommendation has become an important means to help people discover useful information over time. However, the cold-start issue and the special ...
    • Mixed Precision in Heterogeneous Parallel Computing Platforms via Delayed Code Analysis 

      Cattaneo, Daniele; Maggioli, Alberto; Magnani, Gabriele; Denisov, Lev; Yang, Shufan; Agosta, Giovanni; Cherubin, Stefano (Journal article, 2023)
      Mixed Precision techniques have been successfully applied to improve the performance and energy efficiency of computation in embedded and high performance systems. However, few solutions have been proposed that address ...
    • Multi-user CDH Problems and the Concrete Security of NAXOS and HMQV 

      Kiltz, Eike; Pan, Jiaxin; Riepel, Doreen; Ringerud, Magnus Dotset (Peer reviewed; Journal article, 2023)