Browsing Publikasjoner fra CRIStin - NTNU by Journals "Lecture Notes in Computer Science (LNCS)"
Now showing items 81-100 of 130
-
Predicting bending moments with machine learning
(Peer reviewed; Journal article, 2019)We investigate the possibility of predicting the bending moment of slender structures based on a limited number of deflection measurements. These predictions can help to estimate the wear and tear of the structures. We ... -
Professional Development for In-Service Teachers of Programming: Evaluation of a University-Level Program
(Peer reviewed; Journal article, 2021)Professional Development (PD) organizations provide training programs for computer science teachers through teacher PD. Programming as part of a teacher’s PD has grown in importance in K-12 education. As a result, an ... -
Quantifying the Effect of Flexibility and Information Sharing in Transportation Planning
(Peer reviewed; Journal article, 2020)In this paper, we analyze the effect of information sharing between a wholesaler and a transport company in the Norwegian grocery supply chain. The planning process of each company is formulated as a set covering problem, ... -
Quantifying the Re-identification Risk of Event Logs for Process Mining
(Peer reviewed; Journal article, 2020)Event logs recorded during the execution of business processes constitute a valuable source of information. Applying process mining techniques to them, event logs may reveal the actual process execution and enable reasoning ... -
Reality Pregnancy and the Online Recolonization of the Female Body
(Peer reviewed; Journal article, 2023)This study defines and operationalizes reality pregnancy in the context of recolonization as an emerging composite construct. Using partial least squares, the concept of reality pregnancy is shown to have strong significance, ... -
Reflection on how to write the learning outcomes for an online programming course for teachers
(Peer reviewed; Journal article, 2019)The EU Commission for Higher Education through the Bologna Process declaration has put into action a series of reforms. One of the reforms is the development of learning outcomes in the European Credit Transfer and ... -
Revisiting Practical and Usable Coercion-Resistant Remote E-Voting
(Peer reviewed; Journal article, 2020)In this paper we revisit the seminal coercion-resistant e-voting protocol by Juels, Catalano and Jakobsson (JCJ) and in particular the attempts to make it usable and practical. In JCJ the user needs to handle cryptographic ... -
The Role of IT Background for Metacognitive Accuracy, Confidence and Overestimation of Deep Fake Recognition Skills
(Peer reviewed; Journal article, 2022)The emergence of synthetic media such as deep fakes is considered to be a disruptive technology shaping the fight against cybercrime as well as enabling political disinformation. Deep faked material exploits humans’ ... -
The Role of Organizational Culture on Artificial Intelligence Capabilities and Organizational Performance
(Journal article; Peer reviewed, 2022) -
Searching for Unique Neural Descriptors of Primary Colours in EEG Signals: A Classification Study
(Peer reviewed; Journal article, 2021)Identifying unique descriptors for primary colours in EEG signals will open the way to Brain-Computer Interface (BCI) systems that can control devices by exposure to primary colours. This study is aimed to identify such ... -
Secure channels and termination: The last word on TLS
(Peer reviewed; Journal article, 2019)Secure channels are one of the most pivotal building blocks of cryptography today. Internet connections, secure messaging, protected IoT data, etc., all rely upon the security of the underlying channel. In this work we ... -
Selecting and Training Young Cyber Talent: A European Cybersecurity Challenge Case Study
(Peer reviewed; Journal article, 2021)With the increasing popularization of cybersecurity concepts due to ever increasing cybersecurity incidents, it is no secret that countries worldwide are investing heavily in cybersecurity education to build the necessary ... -
Selecting and Training Young Cyber Talent: A Recurrent European Cyber Security Challenge Case Study
(Peer reviewed; Journal article, 2022)Cyber security is a big challenge nowadays. However, the lack of qualified individuals and awareness is making the current situation more problematic. One way to address this problem is through National cyber security ... -
Sentiment Polarity and Emotion Detection from Tweets Using Distant Supervision and Deep Learning Models
(Journal article; Peer reviewed, 2022) -
Short Identity-Based Signatures with Tight Security from Lattices
(Peer reviewed; Journal article, 2021)We construct a short and adaptively secure identity-based signature scheme tightly based on the well-known Short Integer Solution (SIS) assumption. Although identity-based signature schemes can be tightly constructed from ... -
Short Paper: An Update on Marked Mix-Nets: An Attack, a Fix and PQ Possibilities
(Peer reviewed; Journal article, 2020)Marked mix-nets were introduced by Pereira and Rivest as a mechanism to allow very efficient mixing that ensures privacy but at the cost of not guaranteeing integrity. This is useful in a number of e-voting schemes such ... -
Signatures in Shape analysis: An efficient approach to motion identification
(Peer reviewed; Journal article, 2019)Signatures provide a succinct description of certain features of paths in a reparametrization invariant way. We propose a method for classifying shapes based on signatures, and compare it to current approaches based on the ... -
Signatures with Tight Multi-user Security from Search Assumptions
(Peer reviewed; Journal article, 2020)We construct two tightly secure signature schemes based on the computational Diffie-Hellman (CDH) and factoring assumptions in the random oracle model. Our schemes are proven secure in the multi-user setting, and their ... -
Signed Diffie-Hellman Key Exchange with Tight Security
(Peer reviewed; Journal article, 2021)We propose the first tight security proof for the ordinary two-message signed Diffie-Hellman key exchange protocol in the random oracle model. Our proof is based on the strong computational Diffie-Hellman assumption and ... -
Situational States Influence on Team Workload Demands in Cyber Defense Exercise
(Peer reviewed; Journal article, 2021)Cyber operations are increasingly automated processes that can occur at computational speed with the intent of reducing, or denying time for good decision making or time to ground communication between human agents. There ...