Refine
Year of publication
Document Type
- Conference Proceeding (120) (remove)
Conference Type
- Konferenzartikel (109)
- Konferenzband (6)
- Konferenz-Poster (3)
- Sonstiges (3)
- Konferenz-Abstract (1)
Keywords
- Gamification (9)
- Assistive Technology (8)
- Deafblindness (5)
- Wearables (5)
- Education in Optics and Photonics (4)
- Human Computer Interaction (4)
- Licht (4)
- Optik (4)
- Affective Computing (3)
- Communication Systems (3)
- Haptics (3)
- Information Systems (3)
- Tactile (3)
- Virtuelle Realität (3)
- research-oriented education (3)
- Astronomical events (2)
- Design (2)
- Emotion Recognition (2)
- Human Resources (2)
- International Day of Light, IDL (2)
- International Year of Light, IYL (2)
- Live Broadcasting (2)
- Navigation (2)
- Netzwerk (2)
- Photonik (2)
- Psychometrie (2)
- Rehabilitation (2)
- Smart Textiles (2)
- education and research (2)
- optics and photonics (2)
- 3D interaction (1)
- 3D virtual reality (1)
- Algorithmus (1)
- Arbeitstag (1)
- Arbeitswissenschaft (1)
- Art and Photonics (1)
- Assistive Technologies (1)
- Audiovisual Performance (1)
- Augmented Reality (1)
- Ausbildung (1)
- Bildungscontrolling (1)
- Biosignals (1)
- Blockchain (1)
- Bloom filters (1)
- Bruchmechanik (1)
- Cloud Computing (1)
- Cloud Security (1)
- Cloud Service Provider (1)
- Cloud User (1)
- Collision avoidance (1)
- Computer Games (1)
- Computersicherheit (1)
- Computersimulation (1)
- Context-Awareness (1)
- Context-awareness (1)
- DMD (1)
- Data Integrity (1)
- Datenbanksystem (1)
- Datensicherung (1)
- Deaf-Blindness (1)
- Dienstleistung (1)
- Digitale Medien (1)
- Digitalisierung (1)
- Digitalpakt Schule (1)
- E-Learning (1)
- Educations (1)
- Emotions (1)
- Erweiterte Realität <Informatik> (1)
- Fachwissen (1)
- Faserstoff (1)
- Flüssigkristall (1)
- Game Design (1)
- Games (1)
- Ganztagsschule (1)
- Gehirn (1)
- Gender in Science and Technology Studies (STS), digitalization, interactive documentary, participation (1)
- Generative Art (1)
- Gestaltung (1)
- Gewebe (1)
- HR (1)
- Human Computrer Interaction (1)
- Hyperledger (1)
- Impairments (1)
- Improvisation (1)
- Industrie 4.0 (1)
- Informationstechnik (1)
- Interaction metaphor (1)
- Kommunikation (1)
- Kontextbewusstsein (1)
- Kryptographie (1)
- Leap Motion Controller (1)
- Learning (1)
- Learning Analytics (1)
- Lehre (1)
- Lernen (1)
- MINT (1)
- Maschinenbau (1)
- Mikrocontroller (1)
- Neurodivergent (1)
- Onboarding (1)
- Optics and Photonics (1)
- Phontonik (1)
- Physik (1)
- Privatsphäre (1)
- Produktion (1)
- Programmierung (1)
- Prüfung (1)
- Quellcode (1)
- Range imaging RGB-D (1)
- Risk Assessment (1)
- RoboCup (1)
- Roboter (1)
- Robotics (1)
- Robots (1)
- Schulcloud (1)
- Security Engineering (1)
- Segmentierung (1)
- Sensortechnik (1)
- Sicherheit (1)
- Simulation (1)
- Simulation-based Interaction (1)
- Smart Grid (1)
- Smart wearables (1)
- Social Interaction (1)
- Social Robots (1)
- Software Protection (1)
- Software Security (1)
- Sound Synthesis (1)
- Soziale Roboter (1)
- Task Analysis (1)
- Temperaturmessung (1)
- Textile (1)
- Threat Modeling (1)
- Touch (1)
- Umwelt (1)
- Unterricht (1)
- VR (1)
- Vermessung des Menschen (1)
- Virtual Reality (1)
- Visual Impairments (1)
- Web-Applikation (1)
- Wissenschaft (1)
- Zahlung (1)
- Zenware (1)
- agent (1)
- agent based systems (1)
- approximate histograms (1)
- bio-inspired models (1)
- cloud computing (1)
- cloud security (1)
- color vision (1)
- datengestützte Schulentwicklung (1)
- differential mode-delay (1)
- display technologies (1)
- distributed computing (1)
- e-learning (1)
- eingebettetes Gerät (1)
- kanal (1)
- learning scenario (1)
- m-learning (1)
- multimode fibre (1)
- multimode fibre connectors (1)
- peer to peer network (1)
- power distribution (1)
- reliability (1)
- self-organizing networks (1)
- sensor node (1)
- softwaregenerierter Code (1)
- teaching and learning culture (1)
- time series data (1)
- virtual reality (1)
Institute
- Fakultät Medien und Informationswesen (M+I) (bis 21.04.2021) (120) (remove)
Open Access
- Closed Access (68)
- Open Access (46)
- Bronze (3)
- Closed (3)
In recent years, light-weight cryptography has received a lot of attention. Many primitives suitable for resource-restricted hardware platforms have been proposed. In this paper, we present a cryptanalysis of the new stream cipher A2U2 presented at IEEE RFID 2011 [9] that has a key length of 56 bit. We start by disproving and then repairing an extremely efficient attack presented by Chai et al. [8], showing that A2U2 can be broken in less than a second in the chosen-plaintext case. We then turn our attention to the more challenging known-plaintext case and propose a number of attacks. A guess-and-determine approach combined with algebraic cryptanalysis yields an attack that requires about 249 internal guesses. We also show how to determine the 5-bit counter key and how to reconstruct the 56-bit key in about 238 steps if the attacker can freely choose the IV. Furthermore, we investigate the possibility of exploiting the knowledge of a “noisy keystream” by solving a Max-PoSSo problem. We conclude that the cipher needs to be repaired and point out a number of simple measures that would prevent the above attacks.
Ripple: Overview and Outlook
(2015)
Ripple is a payment system and a digital currency which evolved completely independently of Bitcoin. Although Ripple holds the second highest market cap after Bitcoin, there are surprisingly no studies which analyze the provisions of Ripple.
In this paper, we study the current deployment of the Ripple payment system. For that purpose, we overview the Ripple protocol and outline its security and privacy provisions in relation to the Bitcoin system. We also discuss the consensus protocol of Ripple. Contrary to the statement of the Ripple designers, we show that the current choice of parameters does not prevent the occurrence of forks in the system. To remedy this problem, we give a necessary and sufficient condition to prevent any fork in the system. Finally, we analyze the current usage patterns and trade dynamics in Ripple by extracting information from the Ripple global ledger. As far as we are aware, this is the first contribution which sheds light on the current deployment of the Ripple system.
Covert and Side-Channels have been known for a long time due to their versatile forms of appearance. For nearly every technical improvement or change in technology, such channels have been (re-)created or known methods have been adapted. For example the introduction of hyperthreading technology has introduced new possibilities for covert communication between malicious processes because they can now share the arithmetic logical unit (ALU) as well as the L1 and L2 cache which enables establishing multiple covert channels. Even virtualization which is known for its isolation of multiple machines is prone to covert and side-channel attacks due to the sharing of resources. Therefore itis not surprising that cloud computing is not immune to this kind of attacks. Even more, cloud computing with multiple, possibly competing users or customers using the same shared resources may elevate the risk of unwanted communication. In such a setting the ”air gap” between physical servers and networks disappears and only the means of isolation and virtual separation serve as a barrier between adversary and victim. In the work at hand we will provide a survey on weak spots an adversary trying to exfiltrate private data from target virtual machines could exploit in a cloud environment. We will evaluate the feasibility of example attacks and point out possible mitigation solutions if they exist.
Several cloud schedulers have been proposed in the literature with different optimization goals such as reducing power consumption, reducing the overall operational costs or decreasing response times. A less common goal is to enhance the system security by applying specific scheduling decisions. The security risk of covert channels is known for quite some time, but is now back in the focus of research because of the multitenant nature of cloud computing and the co-residency of several per-tenant virtual machines on the same physical machine. Especially several cache covert channels have been identified that aim to bypass a cloud infrastructure's sandboxing mechanism. For instance, cache covert channels like the one proposed by Xu et. al. use the idealistic scenario with two alternately running colluding processes in different VMs accessing the cache to transfer bits by measuring cache access time. Therefore, in this paper we present a cascaded cloud scheduler coined C 3 -Sched aiming at mitigating the threat of a leakage of customers data via cache covert channels by preventing processes to access cache lines alternately. At the same time we aim at maintaining the cloud performance and minimizing the global scheduling overhead.
Nowadays, the wide majority of Europeans uses smartphones. However, touch displays are still not accessible by everyone. Individuals with deafblindness, for example, often face difculties in accessing vision-based touchscreens. Moreover, they typically have few fnancial resources which increases the need for customizable, low-cost assistive devices. In this work-in-progress, we present four prototypes made from low-cost, every-day materials, that make modern pattern lock mechanisms more accessible to individuals with vision impairments or even with deafblindness. Two out of four prototypes turned out to be functional tactile overlays for accessing digital 4-by-4 grids that are regularly used to encode dynamic dot patterns. In future work, we will conduct a user study investigating whether these two prototypes can make dot-based pattern lock mechanisms more accessible for individuals with visual impairments or deafblindness.
In short-reach connections, large-diameter multimode fibres allow for robust and easy connections. Unfortunately, their propagation properties depend on the excitation conditions. We propose a launching technique using a fibre stub that can tolerate fabrication tolerances in terms of tilts and off-sets to a large extent. A study of the influence of displaced connectors along the transmission link shows that the power distributions approach a steady-state power distribution very similar to the initial distribution established by the proposed launching scheme.