Browsing Øvrige samlinger by Journals "Lecture Notes in Computer Science (LNCS)"
Now showing items 41-60 of 123
-
Fostering Learners’ Performance with On-demand Metacognitive Feedback
(Journal article; Peer reviewed, 2019)Activating learners’ deeper thinking mechanisms and reflective judgement (i.e., metacognition) improves learning performance. This study exploits visual analytics to promote metacognition and delivers task-related ... -
From Responsible AI Governance to Competitive Performance: The Mediating Role of Knowledge Management Capabilities
(Journal article; Peer reviewed, 2022)In a constantly changing environment, researchers and practitioners are concerned with the issue of whether responsible artificial intelligence (AI) governance can help build competitive advantage. Responsible AI governance ... -
Gender Differences in Psychosocial Experiences with Humanoid Robots, Programming, And Mathematics Course
(Peer reviewed; Journal article, 2021)Introduction: There is a gender imbalance in Computer science (CS) and STEM education and careers where males are more represented. With evolving technologies arising and the need for a more diverse workforce, it is important ... -
Gender-Inclusive Design: Case Studies and Guidelines
(Journal article, 2023)The importance of inclusivity as a value in our social contexts is increasing; thus, it is not unusual that the software industry has started to embrace it. The need for such a consideration stems from the fact that the ... -
A Generic Construction of Tightly Secure Password-Based Authenticated Key Exchange
(Peer reviewed; Journal article, 2023)We propose a generic construction of password-based authenticated key exchange (PAKE) from key encapsulation mechanisms (KEM). Assuming that the KEM is oneway secure against plaintext-checkable attacks (OW-PCA), we prove ... -
Goalkeeper: A Zero-Sum Exergame for Motivating Physical Activity
(Peer reviewed; Journal article, 2021)Incentives and peer competition have so far been employed independently for increasing physical activity. In this paper, we introduce Goalkeeper, a mobile application that utilizes deposit contracts for motivating physical ... -
Hierarchical Identity-Based Encryption with Tight Multi-challenge Security
(Peer reviewed; Journal article, 2020)We construct the first hierarchical identity-based encryption (HIBE) scheme with tight adaptive security in the multi-challenge setting, where adversaries are allowed to ask for ciphertexts for multiple adaptively chosen ... -
Highly Efficient Key Exchange Protocols with Optimal Tightness
(Journal article; Peer reviewed, 2019)In this paper we give nearly tight reductions for modern implicitly authenticated Diffie-Hellman protocols in the style of the Signal and Noise protocols, which are extremely simple and efficient. Unlike previous approaches, ... -
How Quickly Can We Predict Users’ Ratings on Aesthetic Evaluations of Websites? Employing Machine Learning on Eye-Tracking Data
(Peer reviewed; Journal article, 2020)Abstract. This study examines how quickly we can predictusers’ ratings on vis-ual aesthetics in terms of simplicity, diversity, colorfulness, craftsmanship.To predict users’ ratings, first we capturegaze behaviorwhile ... -
Human-Human Communication in Cyber Threat Situations: A Systematic Review
(Peer reviewed; Journal article, 2021)In cyber threat situations, decision-making processes within organizations and between the affected organization and external entities are high-stake. They require human communication entailing technical complexity, time ... -
Improvements in Everlasting Privacy: Efficient and Secure Zero Knowledge Proofs
(Journal article; Peer reviewed, 2019)Verifiable electronic voting promises to ensure the correctness of elections even in the presence of a corrupt authority, while providing strong privacy guarantees. However, few practical systems with end-to-end verifiability ... -
Improving the Analysis of GPC in Real-Time Calculus
(Journal article; Peer reviewed, 2019)Real-Time Calculus (RTC) is a framework for modeling and performance analysis of real-time networked systems. In RTC, workload and resources are modeled as arrival and service curves, and processing semantics are modeled ... -
In-Service Teacher Training and Self-efficacy
(Peer reviewed; Journal article, 2020)Programming is increasingly introduced in secondary schools, both as a stand-alone subject or integrated into other subjects, leading to growing attention to the training of in-service teachers. Teachers need to learn both ... -
Individual Deep Fake Recognition Skills are Affected by Viewer’s Political Orientation, Agreement with Content and Device Used
(Peer reviewed; Journal article, 2023)AI-generated “deep fakes” is increasingly used by cybercriminals conducting targeted and tailored social engineering attacks, and for influencing public opinion. To raise awareness and efficiently train individuals in ... -
An Information Systems Design Theory for Digital Broker Platforms
(Peer reviewed; Journal article, 2022)Service platforms are becoming dominant drivers of daily business operations in a digitalized environment. Research focuses on technological and network effects of such platforms, while socio-technical opportunities remain ... -
Investigating Aid Effectiveness in Developing Countries: The Case of Nepal
(Peer reviewed; Journal article, 2020)Foreign aid serves as an important source of capital for any developing or under-developed country. It is very important to see how the recipient country can utilize this aid in the economic upliftment of the nation. Taking ... -
Is a Smarter Grid Also Riskier?
(Journal article; Peer reviewed, 2019)The smart grid evolution digitalizes the traditional power distribution grid, by integrating information communication technology into its operation and control. A particularly interesting challenge is the integration of ... -
Lattice-Based Authenticated Key Exchange with Tight Security
(Peer reviewed; Journal article, 2023)We construct the first tightly secure authenticated key exchange (AKE) protocol from lattices. Known tight constructions are all based on Diffie-Hellman-like assumptions. Thus, our protocol is the first construction with ... -
Lattice-Based Proof of Shuffle and Applications to Electronic Voting
(Peer reviewed; Journal article, 2021)A verifiable shuffle of known values is a method for proving that a collection of commitments opens to a given collection of known messages, without revealing a correspondence between commitments and messages. We propose ... -
Lattice-Based Signatures with Tight Adaptive Corruptions and More
(Peer reviewed; Journal article, 2022)We construct the first tightly secure signature schemes in the multi-user setting with adaptive corruptions from lattices. In stark contrast to the previous tight constructions whose security is solely based on number-theoretic ...