توضیحاتی در مورد کتاب Intelligent Computing: Proceedings of the 2022 Computing Conference, Volume 3
نام کتاب : Intelligent Computing: Proceedings of the 2022 Computing Conference, Volume 3
عنوان ترجمه شده به فارسی : محاسبات هوشمند: مجموعه مقالات کنفرانس محاسبات 2022، جلد 3
سری : Lecture Notes in Networks and Systems, 508
نویسندگان : Kohei Arai
ناشر : Springer
سال نشر : 2022
تعداد صفحات : 916
ISBN (شابک) : 3031104668 , 9783031104664
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 82 مگابایت
بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.
فهرست مطالب :
Editor’s Preface
Contents
Wearable Internet of Things (IoT) Device Model Design Based on Low-Cost Healthcare Monitoring System for Current Covid-19 Disease
1 Introduction
2 State of the Art
2.1 IoT in the Context of Covid-19
2.2 WIoT and Covid-19
3 Design Requirements for Healthcare WIoT Devices
3.1 Disease Factors for WIoT Technology Design
3.2 Wearable Architecture
3.3 Oxygen Saturation Monitoring
3.4 Temperature Monitoring
3.5 WIoT Wireless Communications
4 Proposed WIoT Device Model
4.1 Hardware Layer
4.2 Software Layer
4.3 IoT Layer
5 Results of Prototype Implementation
6 Evaluation and Discussion of the Model
7 Conclusions and Future Work
References
A Matching Mechanism for Provision of Housing to the Marginalized
1 Introduction
1.1 Background
1.2 Literature Review
1.3 Our Contribution
2 Model
2.1 Problem Formulation
2.2 The Matching Mechanism
3 Analysis
3.1 Pareto Optimality
3.2 Strategy Proofness
4 Project RoomKey Revisited
4.1 The over Supply, Low-Income Demand Picture
4.2 Project Roomkey Housing Assignment
4.3 Pareto Optimality
4.4 Strategy Proofness
4.5 Locality Expansion
5 Conclusion
5.1 Discussion
5.2 Future Work
References
Speed Harmonisation Strategy for Human-Driven and Autonomous Vehicles Co-existence
1 Introduction
2 Review of the State of the Art
3 Methodology
3.1 Vehicle Movement Schedule
3.2 Traffic Flow Model
4 Experiments
5 Result Discussion and Evaluation
6 Contributions to Knowledge
7 Future Research Direction
8 Conclusion
8.1 Summary
References
Road Intersection Coordination Scheme for Mixed Traffic (Human Driven and Driver-Less Vehicles): A Systematic Review
1 Introduction
1.1 Classification of Traffic Control Means
2 Review of Related Literature
2.1 Intelligent Transportation System
3 Transition from Human-Driven to Autonomous Vehicle Technology
4 Autonomous Intersection Management
4.1 Review Strategy
4.2 Inclusion and Exclusion Criteria
4.3 Data Extraction and Analysis Based on Traffic Control Parameters
5 Research Gap
6 Conclusion
References
Selection of Driving Mode in Autonomous Vehicles Based on Road Profile and Vehicle Speed
1 Introduction
2 Methodology
3 Results
4 Analysis and Discussion
4.1 Sprung Mass Acceleration Tracing
4.2 Tire Spring Length Variation
4.3 Suspension Spring Length Variation
5 Conclusions
References
Compass Errors in Mobile Augmented Reality Navigation Apps: Consequences and Implications
1 Introduction
2 Related Work
3 Experiment Design
3.1 Analysis of Errors: Reference Bearings
3.2 Analysis of Errors: Observed Bearings
4 Results
4.1 All Devices
4.2 Android Phones
4.3 IPhones
4.4 IPads
4.5 Different Apps on the Same Device
4.6 Uncalibrated Results
5 Discussion
5.1 The Scale of the Deviation Curves
5.2 IPhone Versus Android Phones
5.3 Calibration
5.4 Differences Between Apps on the Same Device
5.5 Other Observations
5.6 Implications for Reliability of mAR Compasses
6 Compass Errors and Navigation
6.1 The Function of Hand Bearing Compasses
6.2 Registration at Sea
6.3 Risk of Error Magnification
6.4 Augmented Reality Navigation Apps
6.5 Questions to Address
7 Conclusion
References
Virtual Reality as a Powerful Persuasive Technology to Change Attitude During the Spread of COVID-19
1 Introduction
2 Simulation
2.1 Simulated Cause and Effect Scenarios
2.2 Simulated Environments
2.3 Simulated Objects
3 History
4 VR Explication
5 Equipment Used in Virtual Reality
6 Conclusion
References
Predicting Traffic Indexes on Urban Roads Based on Public Transportation Vehicle Data in Experimental Environment
1 Introduction
2 Methodology
2.1 First Stage - Generating a Schedule
2.2 Second Stage - SUMO Simulation
2.3 Third Stage - Running the Algorithm on the Generated Data
2.4 Fourth Stage - Transformation of the Generated Data
2.5 Fifth Stage - Machine Learning Platform
3 Running the Prediction Models
3.1 Data Preparation
3.2 Single-Step Models
3.3 Multi-step Models
4 Conclusion
References
Corona Virus and Entropy of Shannon at the Cardiac Cycle: A Mathematical Model
1 Introduction
2 The Mathematical Proposal
2.1 Naive Model
2.2 Parameters Correlation
3 Implications
3.1 Derivation of Fundamental Equation
4 Interpretation of Eq.34
4.1 Shannon Entropy from Covid-19 Infection
5 Conclusion
References
Efficiency of Local Binarization Methods in Segmentation of Selected Objects in Echocardiographic Images
1 Introduction
2 Data
3 Methods
3.1 Local Thresholding
3.2 Statistical Dominance Algorithm
3.3 Local Normalization
3.4 Dice Coefficient
3.5 Processing
4 Results
5 Conclusions
References
Automatic Speech-Based Smoking Status Identification
1 Introduction
2 Acoustic Features for Smoking Status Identification
2.1 MFCC and Fbank
2.2 Fundamental Frequency (F0)
2.3 Jitter
2.4 Shimmer
3 Our Method
4 Experiments
4.1 Datasets
4.2 Implementation Details
4.3 Performance Metrics
5 Results
6 Conclusion
References
Independent Component Analysis for Spectral Unmixing of Raman Microscopic Images of Single Human Cells
1 Introduction
2 Independent Component Analysis
3 Results and Discussion
3.1 Raman Data Acquisition and Pre-processing
3.2 Experimental Results
4 Conclusion
References
A Method of Hepatocytes Segmentation in Microscopic Images of Trypan Blue Stained Cellular Suspension
1 Introduction
1.1 Related Works
1.2 Contents of the Paper
2 Materials and Methods
2.1 Used Data
2.2 Proposed Algorithm
3 Results
3.1 Discussion
4 Conclusions
References
Using Technology to Create Personalised Environments for Dementia Care: Results of an Empathy Map Study
1 Premises
2 Objective
3 Method
4 SENSE-GARDEN Concept
4.1 Design Hierarchy of Needs for SENSE-GARDEN
4.2 SENSE-GARDEN usability–the ace up the Sleeve
5 Empathy Mapping for SENSE-GARDEN
5.1 Initial Empathy Map Quadrants
5.2 User Satisfaction with SENSE-GARDEN – the Empathy Map of the First Sessions
5.3 The Final Empathy Map
6 Conclusion
References
Learning Analytics for Knowledge Creation and Inventing in K-12: A Systematic Review
1 Introduction
2 Background
2.1 Constructivist Pedagogies
2.2 Collaborative Learning
2.3 Knowledge-Creating Pedagogies
2.4 Learning Analytics
3 Research Design
3.1 Search Strategy
3.2 Study Selection for Full Read
4 Descriptives: Final Set
4.1 Disciplinary Focus
5 Results
5.1 Educational Technology and Pedagogy
5.2 Three Classes of Learning Analytics
5.3 Learning Analytics: Approaches
6 Discussion
6.1 Edutech for Knowledge Creation and Inventing
6.2 Learning Analytics for Knowledge Creation and Inventing
6.3 Limitations
References
A Conceptual Framework for the Development of Argumentation Skills Using CSCL in a Graduate Students\' Research Course
1 Introduction
2 Theoretical Framework
3 Proposed ASDF
3.1 Course Requirements
3.2 Pedagogical Approaches for ASD
3.3 Human Capacity: The Student as a Researcher
3.4 Infrastructural Requirements
3.5 ODeL Technology Infrastructure
3.6 Output
3.7 Evaluation of the Approach
4 The Scaffolded Learning Journey
5 Toulmin\'s Argumentation Model
6 The Focus Groups
6.1 Focus Group Discussion Findings
6.2 Online Questionnaire Findings
7 Revised ASDF
8 Conclusion
References
Single Access for the Use of Information Technology in University Education During the SARS-CoV-2 Pandemic
1 Introduction
2 Literature Review
2.1 Information Technology Context
2.2 Digital Maturity
2.3 Digital Maturity
2.4 Digital Disruption and Digital Platforms for Education
3 Methodology
4 Results
5 Conclusion
References
Camcorder as an e-Learning Tool
1 Introduction
2 Overview
3 Methodology for Conducting Remote Laboratory Work
3.1 Application of a Video Camera for Laboratory Work in the “Mechanics” Section
3.2 Application of a Video Camera for Laboratory Work in the “Thermal Radiation” Section
4 Discussion
5 Main Conclusions
References
Smartphone in Detecting Developmental Disability in Infancy: A Theoretical Approach to Shared Intentionality for Assessment Tool of Cognitive Decline and e-Learning
1 Introduction
1.1 Shared Intentionality in Cognition
1.2 Primary Data Entry Problem for Understanding Shared Intentionality
2 Approaches to the PDE Problem
2.1 Communication Theory About the PDE Problem
2.2 The PDE Problem in Cognitive Science
2.3 Genetics About the PDE Problem
3 Discussion
4 Future Work
References
Centralized Data Driven Decision Making System for Bangladeshi University Admission
1 Introduction
2 Literature Review
3 Proposed Solution
3.1 Research Method Used and Challenges Faced
3.2 Structure and Source of Data
3.3 Data Pre-processing
3.4 Analyzing Gathered Data
4 Result and Discussion
4.1 Insight on Decision Makers
4.2 Detailed Results
5 Future Work and Conclusion
References
Battle Card, Card Game for Teaching the History of the Incas Through Intelligent Techniques
1 Introduction
2 Related Work
3 Materials and Methods
3.1 Trello
3.2 Artificial Intelligence Algorithms
3.3 Scrum
3.4 Sprints
4 Results
4.1 Unit Tests
4.2 Test of Performance
4.3 Acceptance Tests
5 Conclusions
References
Barriers for Lecturers to Use Open Educational Resources and Participate in Inter-university Teaching Exchange Networks
1 Introduction
2 Open Educational Resources and Teaching Exchange Networks
3 Method
4 Results
4.1 Findings
4.2 Discussion
5 Conclusion
References
Lessons Learnt During the COVID-19 Pandemic: Preparing Tertiary Education in Japan for 4IR
1 Literature Review
1.1 Pre-pandemic Texts
1.2 Texts Written During and in Response to the Pandemic
2 Introduction
3 Methodology
4 Results and Findings
4.1 Demographics of Interviewees
4.2 Teaching Methods of Interviewees
4.3 Preparations Made for Curriculum Change
4.4 Qualitative Data from Open Questions
5 Conclusion
Appendix 1: Raw Data Collected From Questionnaire
References
Ambient Intelligence in Learning Management System (LMS)
1 Introduction
2 AmI System Structure
2.1 Tasks
2.2 Skills
3 Conclusions
References
eMudra: A Leftover Foreign Currency Exchange System Utilizing the Blockchain Technology
1 Introduction
2 Background Research
2.1 Current LFC Utilization Methods
2.2 Issues with Existing LFC Exchange Methods
2.3 LFC Market
2.4 New LFC Exchange Methods
2.5 Drawbacks of the New LFC Exchange Methods
2.6 Peer to Peer Exchange Systems
3 eMudra: The LFC Exchange System
3.1 Traveller’s Journey Use Case
3.2 Business Model
3.3 Blockchain Technology
3.4 Proposed System Architecture of e-Mudra: A P2P Cash LFC Exchange Application
3.5 e-Mudra: The Implementation of the Prototype
4 Conclusion
References
A Multi-layered Ontological Approach to Blockchain Technology
1 Introduction
2 Related Work
2.1 Semantic Blockchain
2.2 Layered Blockchain Ontology
3 Our Approach
3.1 ODLC and Methodology
3.2 Blockchain Application Ontology
3.3 Observations
4 Conclusion and Future Work
References
A Two-Way Atomic Exchange Protocol for Peer-to-Peer Data Trading
1 Introduction
2 Related Work
3 Preliminaries
3.1 Ethereum Smart Contract
3.2 Merkle Tree
3.3 zk-SNARK
4 Trading Protocol
4.1 Participants
4.2 Data Integrity
4.3 Trading Details
4.4 Potential Attack
4.5 Security Discussion
5 Implementation
5.1 Zero-Knowledge Proof
6 Trading Process and Smart Contracts
7 Conclusion
References
Blockchain Industry Implementation and Use Case Framework: A Survey
1 Introduction
2 Research Objective
3 Research Method
4 Brief Overview of Blockchain
5 Blockchain Innovation and Disruption
6 Use Case Frameworks
7 Industry’s Use Cases
8 Security Issues and Challenges
9 Conclusions and Recommendations
References
A Blockchain Approach for Exchanging Machine Learning Solutions Over Smart Contracts
1 Introduction
2 Existing Approaches and Corresponding Shortcomings
3 Proposed Solution
4 Functional Overview
4.1 Specifications of Smart Contracts
4.2 Evaluation and Submission Mechanism
4.3 Machine Learning for Market Regulation
4.4 Architectural Diagram
5 Validation
6 Conclusion
References
Untangling the Overlap Between Blockchain and DLTs
1 Introduction
2 DCEA Framework
3 Data Layer
3.1 Components and Properties
3.2 Data Layer: State of the Art
4 Consensus Layer
4.1 Components and Properties
4.2 Consensus Layer: Dtate of the Srt
5 Execution Layer
5.1 Components and Properties
5.2 Execution Layer: State of the Art
5.3 Environment Openness
6 Application Layer
6.1 Components and Properties
6.2 Application Layer: State of the Art
7 The Distinction Between Blockchain and Blockchain Like System
8 Conclusion
References
A Secure Data Controller System Based on IPFS and Blockchain
1 Introduction
2 Related Work
3 IPFS
4 Materials and Methods
5 Conclusion
References
Key Exchange Protocol Based on the Matrix Power Function Defined Over IM16
1 Introduction
2 Preliminaries
3 Properties of MPF
4 Key Exchange Protocol
5 Resistance of the Proposed KEP Against Decisional Attack
6 Resistance of the Proposed KEP Against Computational Attack
7 Conclusions
References
Design and Analysis of Pre-formed ReRAM-Based PUF
1 Introduction
2 Background Information
2.1 Physical Unclonable Functions
2.2 Resistive Random Access Memory Technology
3 Experimental Setup
3.1 Die Structure
3.2 Device Layout
3.3 Electrical Equipment
3.4 Pre-formed ReRAM-Based PUF Design
4 PUF Analysis
4.1 Temperature Testing
4.2 Reliability
4.3 Stability
4.4 Randomness
5 Conduction Mechanisms
5.1 Poole-Frenkel (P-F) Emissions
5.2 Ohmic Conduction (O-C)
5.3 Space Charge Limited Conduction (SCLC)
5.4 Simulated Butler-Volmer Equation
6 Conclusion and Future Work
References
A Graph Theoretical Methodology for Network Intrusion Fingerprinting and Attack Attribution
1 Introduction
2 Literature Review
3 Methodology
3.1 Initial Steps
3.2 Integrating Information Theory into Graph Theory
3.3 Integrating Spectral Graph Theory
3.4 Experimental Results
3.5 Virus Experiment 2
3.6 Comparing the Virus Experiments
3.7 Virus Experiment Summary
4 Conclusion
References
Using Memory Forensics to Investigate Security and Privacy of Facebook
1 Introduction
2 Background
3 Scope and Methodology
3.1 Platform
3.2 Tools
3.3 Target Data
3.4 Scenario
3.5 Methodology
4 Experiment Results
4.1 First Set of Experiment
4.2 Second Set of Experiments
4.3 Third Set of Experiment
4.4 User Personal Information
4.5 Facebook Activity Information
5 Conclusions
6 Future Research
References
Hash Based Encryption Schemes Using Physically Unclonable Functions
1 Introduction
2 Preliminary
2.1 Cryptographic Hash Functions
2.2 Lamport Digital Signature
2.3 Winternitz
2.4 HORS Digital Signature
2.5 PUFs
2.6 Ternary Addressable Public Key Infrastructure and Keys with Variable Kength
3 Method
3.1 Generic Encryption with Multiple Hashing
3.2 Generic Encryption Combining Multiple Hashing and Random Ordering
4 Results
5 Conclusion
References
Cyber-Safety Awareness: Assisting Schools in Implementation Guidelines
1 Introduction
2 Cyber-Safety Awareness Building Blocks
3 Methodology
4 Theoretical Framework
5 Data Gathering and Findings
6 Proposed Framework
7 Conclusion
References
Reducing Exposure to Hateful Speech Online
1 Introduction
2 Background
2.1 Defining Hate Speech
2.2 Technology to Manage Hate Speech
2.3 Machine Learning
2.4 Summary
3 Prototype Development
3.1 Text Detection
3.2 API
3.3 Text Processing
3.4 Notifying the User
4 Evaluation
4.1 Survey Items
4.2 Survey Results
5 Discussion
5.1 Design
5.2 Technical Implementation
6 Conclusion
References
Hybrid-AI Blockchain Supported Protection Framework for Smart Grids
1 Introduction
2 Background
2.1 State Estimation
2.2 Bad Data Detection
2.3 False Data Injection Attack
2.4 Distributed Denial of Service
3 Proposed Scheme
3.1 Data Integrity and Authentication
3.2 FDIA Mitigation
3.3 DDoS Attack Detection
4 Results and Analysis
4.1 Simulation Settings
4.2 Performance Analysis
4.3 Accuracy Analysis
5 Conclusion
References
Noise-Augmented Privacy-Preserving Empirical Risk Minimization with Dual-Purpose Regularizer and Privacy Budget Retrieval and Recycling
1 Introduction
1.1 Background
1.2 Related Work
1.3 Our Contributions
2 Preliminaries
3 Noise-Augmented Privacy-Preserving ERM
3.1 Noise Augmentation Scheme
3.2 Noise Augmented Privacy-Preserving ERM
3.3 Dual-Purpose Regularization and Mitigation of Over-Regularization (MOOR) Through Iterative Weighted l2
3.4 Computational Algorithm
3.5 NAPP-ERM for Variable Selection
3.6 Guarantees of DP in NAPP-ERM
3.7 Privacy Budget Retrieval
3.8 Summary on NAPP-ERM
4 Utility Analysis
4.1 Excess Risk Bound
4.2 Sample Complexity
5 Experiments
5.1 Mitigation of Over-Regularization (MOOR)
5.2 Private Variable Selection and Outcome Prediction
5.3 Privacy Budget Retrieval and Recycling
5.4 Experiment Result Summary
6 Discussion and Conclusion
References
Data Security Awareness and Proper Handling of ICT Equipment of Employees: An Assessment
1 Introduction
1.1 Research Framework
2 Methods
3 Results and Discussions
3.1 Profile of the Respondents
3.2 Facility Exposure of the Respondents to ICT Equipment
3.3 Technology Competency Level of Employees in Proper Handling of ICT Equipment
3.4 Respondents Level of Data Security Awareness
3.5 Relationship Between Respondents’ Competency Level on the Proper Handling of ICT Equipment and Their Profile Variables
3.6 Relationship Between Respondents’ Competency Level on the Proper Handling of ICT Equipment and Their Level of Awareness on Data Security
4 Conclusions and Recommendations
References
Developing a Webpage Phishing Attack Detection Tool
1 Introduction
2 Webpages Phishing Detection Techniques
2.1 Search Engine Based
2.2 Visual Similarity Based
2.3 Blacklist and Whitelist Based
2.4 Heuristics and Machine Learning Based
2.5 Proactive Phishing URL Detection Based
2.6 DNS Based
3 Related Work
4 The Proposed Approach
4.1 The First Phase
4.2 The Second Phase
5 Implementation and Testing
5.1 Dataset
5.2 Storing White-List Database
5.3 Experiment Results
5.4 Results Evaluation
6 Conclusion and Future Work
References
An Evaluation Model Supporting IT Outsourcing Decision for Organizations
1 Introduction
2 Research Aim and Methodology
3 Findings
4 Discussion
4.1 Market
4.2 IT Governance
4.3 Security
4.4 Benefits and Disadvantages
4.5 Outsourcing Methods
4.6 Determinants
5 Evaluation Model Supporting IT Outsourcing
6 Conclusions and Future Research
References
Immunizing Files Against Ransomware with Koalafied Immunity
1 Introduction
2 Koalafied Immunity
2.1 What if Ransomware Encrypts the Entire File?
3 Experiment Design
4 Results
5 Future Work
6 Conclusion
References
Measuring the Resolution Resiliency of Second-Level Domain Name
1 Introduction
2 DNS Ecosystem
3 DNS Resolution Failure
4 Related Work
4.1 Measure DNS Resiliency
4.2 Address DNS Resolution Failures
5 Resolution Resiliency Measurement
5.1 Domain Status Code Metrics
5.2 NS Diversity Metrics
5.3 TTL Configuration Metrics
5.4 Measure Resolution Resiliency
5.5 Experiment
6 Resolution Resiliency Improvement
7 Conclusion
References
An Advanced Algorithm for Email Classification by Using SMTP Code
1 Introduction
2 Research Background
2.1 Email Environment
2.2 Literature Review
3 Proposed Algorithm
3.1 Terms
3.2 Basic Concept and Procedure
3.3 Flow of Email Transmission Agent
3.4 Logic Flow
3.5 Each Step of Algorithm
4 Performance
4.1 Computing Performance
4.2 Classification Performance
5 Conclusion
5.1 Summary
5.2 Implications for Research and Practice
5.3 Limitation and Direction of Further Research
References
Protecting Privacy Using Low-Cost Data Diodes and Strong Cryptography
1 Introduction
2 Network Security Threats
3 Data Diodes
3.1 Low-Cost Data Diodes
3.2 Side-Channels
4 Encryption
4.1 One-Time-Pad
4.2 Post-Quantum Cryptography
4.3 Meta-Data
4.4 True Random Number Generators
4.5 Low-Cost TRNG\'s
5 Discussion
References
A Security System for National Network
1 Introduction
2 Research Background
3 Security System
3.1 Internal/External Interface for System Access Control
3.2 Alert Generation and Unauthorized Access Prevention Module
3.3 Real-Time Defense Function for Control System
4 Performance Evaluation
4.1 Unauthorized IP Blocking Rate
4.2 Unauthorized MAC Blocking Rate
4.3 Blocking Rate Based on Security Policy
4.4 Abnormal Traffic Detection
4.5 Real-Time Monitoring of Illegal Access
5 Conclusion
References
Secured Digital Oblivious Pseudorandom and Linear Regression Privacy for Connected Health Services
1 Introduction
2 Related Works
3 Methodology
3.1 Distinctive Nearest Neighbor Confidence Feature Selection Model
3.2 Digital Oblivious Pseudorandom Signature-based Authentication Model
3.3 Linear Regression Privacy Preservation Communication Model
4 Experiments and Results Section
5 Results Section
5.1 Case 1: Response Time Analysis
5.2 Case 2: Authentication Accuracy Analysis
5.3 Case 3: Security Analysis
6 Conclusion
References
Hardware Implementation for Analog Key Encapsulation Based on ReRAM PUF
1 Introduction
2 Background
3 Objective
4 Methodology
4.1 Protocol Steps
4.2 ReRAM Shield 2.0
4.3 Hardware
5 Implementation
5.1 Implementation Challenges
6 Results
7 Summary and Future Work
References
Questions of Trust in Norms of Zero Trust
1 Introduction
2 Norms and Emergence
3 Zero Trust and Norms
4 Trust
5 SolarWinds
6 Understanding Trust in Zero Trust
7 Conclusion, Limitations Implications
References
Leveraging Zero Trust Security Strategy to Facilitate Compliance to Data Protection Regulations
1 Introduction
1.1 Problem Statement
1.2 Information Security Frameworks to Protect Privacy
1.3 Zero Trust as a Security Strategy
1.4 The Role of the CISO and the DPO
2 Proposing the ON2IT Zero Trust Framework for Privacy
3 Research Approach
4 Results for a Zero Trust Framework Applied to Privacy
4.1 Discussion on the GSS Session Results
5 Leveraging the Zero Trust Strategy to Facilitate Compliance to Data Protection Regulations
5.1 From Corporate Governance Policies to Zero Trust Measures
5.2 How Zero Trust Measures Enables Data Protection Laws
6 Discussion
7 Conclusion
References
Perspectives from 50+ Years’ Practical Zero Trust Experience and Learnings on Buyer Expectations and Industry Promises
1 Introduction
1.1 Introducing Zero Trust
1.2 Industry Promises
2 The Problem
2.1 Problem Statement
3 Expert Panel Interviews
4 Results
4.1 Interview Results
5 Important Takeaways
5.1 How to Design a Protect Surface
5.2 Zero Trust Documentation
6 Conclusions
References
Bit Error Rate Analysis of Pre-formed ReRAM-based PUF
1 Introduction
2 Background Information
2.1 Physically Unclonable Functions (PUFs)
2.2 Existing Key Generation Protocols Based on Ternary Implementation
2.3 Resistive RAM (ReRAM) Technology
2.4 Background on ReRAM-Based PUFs
3 ReRAM PUFs Operating at Low Power
3.1 Pre-Formed ReRAM PUF
3.2 Cryptographic Key Generation Protocol Using Pre-Formed ReRAM
3.3 Benchmarking Various PUF BERs
4 Methodology
4.1 Experimental Setup
4.2 Computing Error Rate of Each Cell of the ReRAM
4.3 Compute BER with Different Buffer Size
5 Experimental Results
6 Conclusions and Future Work
References
Author Index