Blar i Fakultet for informasjonsteknologi og elektroteknikk (IE) på tidsskrift "Lecture Notes in Computer Science (LNCS)"
Viser treff 1-20 av 121
-
Advances in Machine-Learning Based Disaggregation of Building Heating Loads: A Review
(Peer reviewed; Journal article, 2023)This review article investigates the methods proposed for disaggregating the space heating units’ load from the aggregate electricity load of commercial and residential buildings. It explores conventional approaches together ... -
Affordances in Human-Chatbot Interaction: A Review of the Literature.
(Peer reviewed; Journal article, 2021)The present study advances our understanding of human-AI interactions, by identifying and analyzing chatbot affordances in prior research. The results of this review consolidate research findings on chatbots’ affordances, ... -
Analysis of uPort Open, an identity management blockchain-based solution
(Peer reviewed; Journal article, 2020)Recently, academics and professionals proposed a substantial number of identity management solutions based on blockchain technology. Among them, uPort appeared promising, being considered for both personal and administrative ... -
Anonymous Tokens with Public Metadata and Applications to Private Contact Tracing
(Peer reviewed; Journal article, 2022)Anonymous single-use tokens have seen recent applications in private Internet browsing and anonymous statistics collection. We develop new schemes in order to include public metadata such as expiration dates for tokens. ... -
Applications of an Online Audience Response System in Different Academic Settings: An Empirical Study
(Peer reviewed; Journal article, 2020)Technology dependent, digitally innate students are joining academia. Consequently, traditional pedagogical techniques for achieving desired learning outcomes are not universally sufficient. Digital clickers were introduced ... -
Artificial Intelligence Ambidexterity, Adaptive Transformation Capability, and Their Impact on Performance Under Tumultuous Times
(Peer reviewed; Journal article, 2022) -
Authenticated Key Exchange and Signatures with Tight Security in the Standard Model
(Peer reviewed; Journal article, 2021)We construct the first authenticated key exchange protocols that achieve tight security in the standard model. Previous works either relied on techniques that seem to inherently require a random oracle, or achieved only ... -
Automatically Detecting Political Viewpoints in Norwegian Text
(Journal article, 2024)We introduce three resources to support research on political texts in Scandinavia. The encoder-decoder transformer models sp-t5 and sp-t5-keyword were trained on political texts. The nor-pvi (available at https://tinyur ... -
Backward-Leak Uni-Directional Updatable Encryption from (Homomorphic) Public Key Encryption
(Peer reviewed; Journal article, 2023)The understanding of directionality for updatable encryption (UE) schemes is important, but not yet completed in the literature. We show that security in the backward-leak uni-directional key updates setting is equivalent ... -
Big Data Analytics Affordances for Social Innovation: A Theoretical Framework
(Peer reviewed; Journal article, 2021)This paper proposes a theoretical framework to identify the mechanisms by which actors perceive the affordances of big data analytics (BDA) and how institutional voids and supports enable or hinder the actualisation of ... -
A Blind Coupon Mechanism Enabling Veto Voting over Unreliable Networks
(Peer reviewed; Journal article, 2019)A Blind Coupon Mechanism (BCM) allows spreading of alerts quietly and quickly over unreliable networks. The BCM primitive ensures that alerts are efficiently broadcast while the nature of these signals are securely hidden. ... -
Bridging Values: The Inclusion of Young Generations in Computing
(Journal article, 2023)There is a constantly growing need for skilled professionals in the computing field, which poses challenges for finding the right people for the job. According to the 2022 Digital Economy and Society Index, 55% of companies ... -
Chopsticks: Fork-Free Two-Round Multi-signatures from Non-interactive Assumptions
(Peer reviewed; Journal article, 2023)Multi-signatures have been drawing lots of attention in recent years, due to their applications in cryptocurrencies. Most early constructions require three-round signing, and recent constructions have managed to reduce the ... -
Cloud-assisted Asynchronous Key Transport with Post-Quantum Security
(Peer reviewed; Journal article, 2020)In cloud-based outsourced storage systems, many users wish to securely store their files for later retrieval, and additionally to share them with other users. These retrieving users may not be online at the point of the ... -
Collaborative Learning Using Technological Tools - A Framework for the Future.
(Journal article, 2022)This paper focuses on educational technology designed for collaborative learning, or more correct these tools’ abilities for enhancing collaboration in the learning environment. The paper reports on findings from the ... -
Color Calibration on Human Skin Images
(Journal article; Peer reviewed, 2019)Many recent medical developments rely on image analysis, however, it is not convenient nor cost-efficient to use professional image acquisition tools in every clinic or laboratory. Hence, a reliable color calibration is ... -
Compact and Tightly Selective-Opening Secure Public-key Encryption Schemes
(Peer reviewed; Journal article, 2022)We propose four public-key encryption schemes with tight simulation-based selective-opening security against chosen-ciphertext attacks (SIM-SO-CCA) in the random oracle model. Our schemes only consist of small constant ... -
Confirmation sampling for exact nearest neighbor search
(Peer reviewed; Journal article, 2020)Locality-sensitive hashing (LSH), introduced by Indyk and Motwani in STOC ’98, has been an extremely influential framework for nearest neighbor search in high-dimensional data sets. While theoretical work has focused on ... -
Cronus: Everlasting Privacy with Audit and Cast
(Journal article; Peer reviewed, 2019)We present a new online voting scheme with everlasting privacy and cast-as-intended verifiability. We follow the so called “audit-and-cast” paradigm where the voter audits the ballot before casting it. To mitigate the ... -
Cryptographic smooth neighbors
(Peer reviewed; Journal article, 2023)We revisit the problem of finding two consecutive B-smooth integers by giving an optimised implementation of the Conrey-Holmstrom-McLaughlin “smooth neighbors” algorithm. While this algorithm is not guaranteed to return ...