Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Science and Technology Studies

Identity-Based Data Storage In Cloud Computing, Jinguang Han, Willy Susilo, Yi Mu Mar 2014

Identity-Based Data Storage In Cloud Computing, Jinguang Han, Willy Susilo, Yi Mu

Professor Willy Susilo

Identity-based proxy re-encryption schemes have been proposed to shift the burden of managing numerous files from the owner to a proxy server. Nevertheless, the existing solutions suffer from several drawbacks. First, the access permission is determined by the central authority, which makes the scheme impractical. Second, they are insecure against collusion attacks. Finally, only queries from the same domain (intra-domain) are considered. We note that one of the main applications of identity-based proxy re-encryption schemes is in the cloud computing scenario. Nevertheless, in this scenario, users in different domains can share files with each other. Therefore, the existing solutions do …


A Secure And Effective Anonymous User Authentication Scheme For Roaming Service In Global Mobility Networks, Fentong Wen, Willy Susilo, Guomin Yang Mar 2014

A Secure And Effective Anonymous User Authentication Scheme For Roaming Service In Global Mobility Networks, Fentong Wen, Willy Susilo, Guomin Yang

Professor Willy Susilo

In global mobility networks, anonymous user authentication is an essential task for enabling roaming service. In a recent paper, Jiang et al. proposed a smart card based anonymous user authentication scheme for roaming service in global mobility networks. This scheme can protect user privacy and is believed to have many abilities to resist a range of network attacks, even if the secret information stored in the smart card is compromised. In this paper, we analyze the security of Jiang et al.'s scheme, and show that the scheme is in fact insecure against the stolen-verifier attack and replay attack. Then, we …


Efficient Linkable And/Or Threshold Ring Signature Without Random Oracles, Tsz Hon Yuen, Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou Mar 2014

Efficient Linkable And/Or Threshold Ring Signature Without Random Oracles, Tsz Hon Yuen, Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou

Professor Willy Susilo

Linkable ring signatures have found many attractive applications. One of the recent important extensions is a linkable threshold ring signature (LTRS) scheme. Unfortunately, the existing LTRS schemes are only secure in the random oracle model (ROM). In this paper, we make the following contributions. First, we construct the first LTRS scheme that is secure without requiring the ROM. Further, we enhance the security of a threshold ring signature (for both linkable or non-linkable) by providing a stronger definition of anonymity. This strengthened notion makes threshold ring signature schemes more suitable in real life. Finally, we provide efficient schemes that outperform …


Social Implications Of Technology: The Past, The Present, And The Future, Karl Stephan, Katina Michael, M. G. Michael, Laura Jacob, Emily Anesta Mar 2014

Social Implications Of Technology: The Past, The Present, And The Future, Karl Stephan, Katina Michael, M. G. Michael, Laura Jacob, Emily Anesta

Professor Katina Michael

The social implications of a wide variety of technologies are the subject matter of the IEEE Society on Social Implications of Technology (SSIT). This paper reviews the SSIT’s contributions since the Society’s founding in 1982, and surveys the outlook for certain key technologies that may have significant social impacts in the future. Military and security technologies, always of significant interest to SSIT, may become more autonomous with less human intervention, and this may have both good and bad consequences. We examine some current trends such as mobile, wearable, and pervasive computing, and find both dangers and opportunities in these trends. …


Gestural Interface Technology In Early Childhood Education: A Framework For Fully Engaged Communication, Holly Tootell, Melinda Plumb, Colin D. Hadfield, Linda Dawson Jan 2014

Gestural Interface Technology In Early Childhood Education: A Framework For Fully Engaged Communication, Holly Tootell, Melinda Plumb, Colin D. Hadfield, Linda Dawson

Associate Professor Linda Dawson

Gestural Interface Technology (GIT) has changed the way technology is adopted in classrooms for all ages. The accessibility of control through touch means that technology such as Apple's iPad can be used in early childhood education. In this paper, we introduce a framework for fully-engaged communication, developed from educational pedagogy and critical engagement in information systems. The intersection of these dimensions creates a view of a GIT lifeworld approach which allows it to be used to understand multiple layers of engagement that exist within an early childhood education environment.


Social Implications Of Technology: The Past, The Present, And The Future, Karl Stephan, Katina Michael, M. G. Michael, Laura Jacob, Emily Anesta Jan 2014

Social Implications Of Technology: The Past, The Present, And The Future, Karl Stephan, Katina Michael, M. G. Michael, Laura Jacob, Emily Anesta

M. G. Michael

The social implications of a wide variety of technologies are the subject matter of the IEEE Society on Social Implications of Technology (SSIT). This paper reviews the SSIT’s contributions since the Society’s founding in 1982, and surveys the outlook for certain key technologies that may have significant social impacts in the future. Military and security technologies, always of significant interest to SSIT, may become more autonomous with less human intervention, and this may have both good and bad consequences. We examine some current trends such as mobile, wearable, and pervasive computing, and find both dangers and opportunities in these trends. …