{"title":"A practical differential power analysis attack against an FPGA implementation of AES cryptosystem","authors":"Mehdi Masoomi, M. Masoumi, M. Ahmadian","doi":"10.1109/I-SOCIETY16502.2010.6018719","DOIUrl":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018719","url":null,"abstract":"Differential Power Analysis (DPA) implies measuring the supply current of a cipher-circuit in an attempt to uncover part of a cipher key. Cryptographic security gets compromised if the current waveforms obtained correlate with those from a hypothetical power model of the circuit. In recent years, the security of the Advanced Encryption Standard (AES) against Differential (DPA), has received considerable attention. While FPGAs are becoming increasingly popular for cryptographic applications, there are only a few articles that assess their vulnerability to such attacks. The purpose of this paper is to describe a practical and successful implementation of the attack and provide strong evidence that DPA is a serious threat against realizations of the AES on SRAM-based FPGAs without effective countermeasure.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128110829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Open source E-learning in higher education: Problems, solutions and long-term sustainability of the approach","authors":"R. Stafford, Christina L. Catlin-Groves","doi":"10.1109/I-SOCIETY16502.2010.6018753","DOIUrl":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018753","url":null,"abstract":"Open source software has dramatically reduced the cost of computing. Initiatives to replicate this cost reduction in educational software have initially been slow to take off. Here the development and release of open educational resources are considered and the problems of overcoming issues of shared copyright with, and liability of, the institution (i.e. university) are addressed. Solutions for the long-term sustainability of open educational resources appear to be the commitment of external funding for their development and the scholarly recognition of the production of such resources.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"169 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121617563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information systems models: A synthesized validated model for measuring information systems impacts on end user performance","authors":"A. Abugabah, L. Sanzogni","doi":"10.1109/I-SOCIETY16502.2010.6018829","DOIUrl":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018829","url":null,"abstract":"In the last decades, information systems (IS) researchers have concentrated their efforts in developing and testing models that help with the investigation of IS and user performance in different environments. As a result, a number of models for studying end users' systems utilization and other related issues including system usefulness, system success and user aspects in business organizations have appeared. A synthesized model consolidating three well known and widely used models in IS research is proposed. Our model was empirically tested in a sophisticated IS environment investigating the impacts of the enterprise recourse planning (ERP) systems on user perceived performance. Statistical analysis was performed including factors analysis and regression to test the model and prove its validity. The findings demonstrated that the proposed model performed well as most factors had direct and or indirect significant influences on user perceived performance suggesting therefore that the model possesses the ability to explain the main impacts of these factors on ERP users.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"319 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123096098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of firms' innovative performance in Japanese mobile telecommunication industry based on patent data","authors":"Katsuhiro Suzuki","doi":"10.1109/I-SOCIETY16502.2010.6018824","DOIUrl":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018824","url":null,"abstract":"Mobile telecommunication industry has show remarkable technological progress in these twenty years. Recently, cell phones in Japan are equipped with unique high functions based on cutting-edge technologies such as one-seg television or non-contact payment system. In the present work, we investigate the technological characteristics of R&D in Japanese telecommunication carriers by using patent data. We also analyze the relationship between R&D activities and subsequent firm's performances based on panel data analysis. Similar to former studies concerning pharmaceutical industry or machine tool manufacturing industry, strong correlation between the number of patent applications and that of subscribers is found. It is also shown that regression model with shorter time-lag gives better description of the relationship between R&D inputs and outcome in this sector.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124867806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real time expression recognition using correlation and support vector machine","authors":"Rahul Bhatia, S. Kapoor, S. Khanna","doi":"10.1109/I-SOCIETY16502.2010.6018740","DOIUrl":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018740","url":null,"abstract":"Facial expressions deliver rich information about human emotion and play an essential role in human communications. This paper presents a design and evaluation of a novel computational model that categorizes facial expressions in real time video for the reason of automating human computer interfaces. It highlights the main system components, methodology for the development of the prototype and some research challenges. The concepts of correlation have been used to detect the face in video sequences and multiclass SVM is used for classification. The method has been evaluated in terms of recognition accuracy using a well known Facial Expression database, Japanese Female Facial Expression database as well as using the database of face images of the authors. The experimental results show the effectiveness of our scheme.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"186 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123265086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"User satisfaction with an Internet-based learning medium","authors":"Christy M. K. Cheung, Matthew K. O. Lee","doi":"10.1109/I-SOCIETY16502.2010.6018752","DOIUrl":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018752","url":null,"abstract":"The study is one of the very few attempts to investigate antecedents and consequences of satisfaction with an Internet-based learning medium. By extending McKinney et al.'s (2002) web-customer satisfaction model, the research model postulates a positive link between overall satisfaction and intention to continue to use an ILM. Data collected from 504 undergraduate students are examined through the Structural Equation Modeling approach with Partial Least Squares (PLS). Empirical findings demonstrated that our research model provided a relatively high explanatory power. Moreover, all hypothesized associated were found statistically significance. The implications of this study are noteworthy for both researchers and practitioners.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121101467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A framework for Internet adoption in sporting bodies: A local New Zealand sporting case","authors":"S. Bingley, Stephen Burgess","doi":"10.1109/I-SOCIETY16502.2010.6018736","DOIUrl":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018736","url":null,"abstract":"Sport at a local, or social level, requires volunteers to support the needs of sporting associations and their participating clubs. Research has shown that volunteers and associations are starting to adopt the Internet to assist in the administration of their clubs and their association. This study uses Rogers' Innovation-decision process as a framework to identify how this process of adoption is occurring. The researchers have applied this framework to investigate how this is occurring in a cricket association in Auckland, New Zealand.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116359505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Addressing security, privacy and confidentiality in a mobile teaching and learning assessment system for health and social care students","authors":"Robert Campbell, Trish Walker, J. Laxton","doi":"10.1109/I-SOCIETY16502.2010.6018832","DOIUrl":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018832","url":null,"abstract":"The ALPS programme and its Mobile Technologies Project has successfully implemented a large scale, 900 user, student assessment system using Windows Mobile PDAs for students across five universities involving 16 health and social care professions. The solution addresses the security needs within the context of the teaching and health and social care environment using a multi-layered approach including social and cultural change management, policy development and the application of several integrated security technologies such as device and data encryption, strong user authentication and physical signatures. A number of key conclusions and recommendations are drawn from the ALPS experience and are presented here which should inform future projects of this nature of best practice.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122955606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Of mice or men? — The avatar in the virtualscape","authors":"M. Conrad, J. Neale, Alec Charles","doi":"10.1109/I-SOCIETY16502.2010.6018705","DOIUrl":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018705","url":null,"abstract":"The study focuses on the relationship users of virtual worlds, such as Second Life, may or may not develop towards the avatar they use. A questionnaire was developed to collect both qualitative and quantitative data from students engaged in a university assignment that required them to use an avatar in Second Life. The findings are contextualized and discussed: The distinction between the avatar and the self seems to be blurring.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126911563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information asymmetry in the digital economy","authors":"Miranda Kajtazi","doi":"10.1109/I-SOCIETY16502.2010.6018811","DOIUrl":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018811","url":null,"abstract":"Information asymmetry is a problem that prevents communication processes to be effective in the digital economy. In this paper, we propose a model for understanding information asymmetry. Our analyses are conducted using the newspaper industry, the healthcare sector, and the stock exchange market. These analyses are examined using theories of communication processes in which two or more actors are necessary to engage in activities of information exchange. The study of these three examples resulted in the identification of four information exchange patterns: influenced, intentional, hindered, and unawares. Furthermore, we discuss implications of the model for information exchange in practice. The paper concludes by challenging sustainability in the digital economy, which remains problematic and difficult to achieve.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130468288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}