Refine
Year of publication
Document Type
- Conference Proceeding (44)
- Article (22)
- Book (5)
- Part of a Book (4)
- Contribution to a Periodical (4)
- Report (2)
- Master's Thesis (1)
- Preprint (1)
Is part of the Bibliography
- no (83)
Keywords
Institute
This chapter describes our research efforts related to the design of mobile learning (m-learning) applications in cloud-computing (CC) environments. Many cloud-based services can be used/integrated in m-learning scenarios, hence, there is a rich source of applications that could easily be applied to design and deploy those within the context of cloud-based services. Here, we present two cloud-based approaches—a flexible framework for an easy generation and deployment of mobile learning applications for teachers, and a flexible contextualization service to support personalized learning environment for mobile learners. The framework provides a flexible approach that supports teachers in designing mobile applications and automatically deploys those in order to allow teachers to create their own m-learning activities supported by mobile devices. The contextualization service is proposed to improve the content delivery of learning objects (LOs). This service allows adapting the learning content and the mobile user interface (UI) to the current context of the user. Together, this leads to a powerful and flexible framework for the provisioning of potentially ad hoc mobile learning scenarios. We provide a description of the design and implementation of two proposed cloud-based approaches together with scenario examples. Furthermore, we discuss the benefits of using flexible and contextualized cloud applications in mobile learning scenarios. Hereby, we contribute to this growing field of research by exploring new ways for designing and using flexible and contextualized cloud-based applications that support m-learning.
Anonymity-preserving Methods for Client-side Filtering in Position-based Collaboration Approaches
(2017)
In recent times, a lot of attacks against central server infrastructures have been recognized. Those infrastructures have seen attacks ranging from attacks against Internt of Things (IoT) infrastructures, via attacks against public infrastructure to attacks against cryptocurrency exchanges and blockchain based infrastructures themselves, e.g., the already almost legendary Decentralized Autonomous Organization (DAO) hack. Measured by press coverage, attacks against cryptocurrency exchanges and infrastructures seem to be among the most prominently reported attacks, probably due to the large amount of money that is stolen during those attacks and the great (but obviously still quite risky) potential (and financial involvement) of the blockchain technology. Naturally, attacks like the ones we have seen recently in crease the notion of uncertainty of blockchain technologies among the people,mreflected in lower values of cryptocurrencies in general. Obviously, this demands for an overall increase of security of cryptocurrency based technologies. Therefore, this paper provides an architectural approach, based on a proxy,to increase security of publicly available nodes of a blockchain based technology. Furthermore, it provides a first evaluation of the approach based on the results of an extensive community test of a new cryptocurrency.
Integrating Social Networking Sites in Day-to-Day Learning Scenarios - A Facebook Based Approach
(2012)
In recent years, the number of users in social networking sites regularly increased. Especially younger people spend a tremendous time on social networking sites like Facebook, YouTube, Flickr, Google+ and many more. Since obviously this is the place on the World-Wide-Web where our students spent their spare time, we integrated social networking sites in our day-to-day learning scenarios. This is on the one hand to start working with our students where they feel comfortable, and on the other hand to allow to foster the communication among our students about the topic of the lectures.
The Bitcoin whitepaper states that security of the system is guaranteed as long as honest miners control more than half of the current total computational power. The whitepaper assumes a static difficulty, thus it is equally hard to solve a cryptographic proof-of-work puzzle for any given moment of the system history. However, the real Bitcoin network is using an adaptive difficulty adjustment mechanism. In this paper we introduce and analyze a new kind of attack on a mining difficulty retargeting function used in Bitcoin. A malicious miner is increasing his mining profits from the attack, named coin-hopping attack, and, as a side effect, an average delay between blocks is increasing. We propose an alternative difficulty adjustment algorithm in order to reduce an incentive to perform coin-hopping, and also to improve stability of inter-block delays. Finally, we evaluate the presented approach and show that the novel algorithm performs better than the original algorithm of Bitcoin.
Web based security applications have become increasingly important in the past years. Especially in times of blockchain based crypto currencies, user authentication is a critical aspect for the overall security, integrity and acceptance of such systems. While blockchain technologies provide a decentralized approach, the client side still largely relies on centralized security approaches. Those centralized approaches are easier to implement, but at the same time bear the risk of usual security flaws. Therefore, this paper presents a decentralized approach for increasing the security by adding a decentralized two-factor authentication mechanism to the execution of
operations.