scholarly journals Some Faces are More Equal than Others: Hierarchical Organization for Accurate and Efficient Large-Scale Identity-Based Face Retrieval

Author(s):  
Binod Bhattarai ◽  
Gaurav Sharma ◽  
Frédéric Jurie ◽  
Patrick Pérez
Author(s):  
David C. Schak

The level of civility is much higher in Taiwan and in China, something Chinese visitors to Taiwan readily acknowledge and regard as owing to Taiwan having preserved traditional Chinese culture. However, prior to 1990, Taiwan’s state of civility was similar to that in China. This chapter traces how Taiwan made this transition and argues that it was accompanied by Taiwan’s evolving from a plethora of small, inward-looking communities to a society with a unified identity based on a civil nationalism, a society in itself to a society for itself. This came about through a combination of political struggles, economic development and rural-urban migration, and the self-help movements (zili jiuji) of the 1980s. Manifest changes in civil behavior began with Taiwan’s democratization. Some aspects of the increase in civility, e.g. driver behavior, were helped along by rule enforcement, some by the demonstration effect of a large-scale public philanthropic project, and some simply by people putting into practice what they had been taught in school. Taiwan has high levels of philanthropy and voluntarism an many charity-focused civil society groups


Symmetry ◽  
2020 ◽  
Vol 12 (10) ◽  
pp. 1687 ◽  
Author(s):  
Mahmood A. Al-shareeda ◽  
Mohammed Anbar ◽  
Selvakumar Manickam ◽  
Iznan H. Hasbullah

The security and privacy issues in vehicular ad hoc networks (VANETs) are often addressed with schemes based on either public key infrastructure, group signature, or identity. However, none of these schemes appropriately address the efficient verification of multiple VANET messages in high-density traffic areas. Attackers could obtain sensitive information kept in a tamper-proof device (TPD) by using a side-channel attack. In this paper, we propose an identity-based conditional privacy-preserving authentication scheme that supports a batch verification process for the simultaneous verification of multiple messages by each node. Furthermore, to thwart side-channel attacks, vehicle information in the TPD is periodically and frequently updated. Finally, since the proposed scheme does not utilize the bilinear pairing operation or the Map-To-Point hash function, its performance outperforms other schemes, making it viable for large-scale VANETs deployment.


2020 ◽  
Vol 63 (8) ◽  
pp. 1271-1271
Author(s):  
Qianqian Su ◽  
Rui Zhang ◽  
Rui Xue

Abstract Modular exponentiation, as a fundamental operation used in many public-key cryptosystems, has always be considered to be very time-consuming. It is difficult for some devices with limited computation capability, such as mobile devices and low-cost radio frequency identification (RFID) tags, to perform large-scale modular exponentiations. In cryptosystems, one typical case of modular exponentiation is that the modulus is a composite number. For instance, in RSA algorithm, the modulus is the product of two distinct prime numbers. In this paper, we investigate how to securely and efficiently outsource composite modular exponentiations and put forward two secure outsourcing algorithms for composite modular exponentiations based on single untrusted cloud. The first algorithm, named MCExp, is designed for outsourcing single composite modular exponentiation, i.e. $u^a$ mod $N$. The second algorithm, named SMCExp, is designed for outsourcing simultaneous composite modular exponentiation, i.e. $\prod ^{n}_{i=1}u^{a_i}_{i}$ mod $N$. Different from algorithms based on two untrusted servers, the proposed algorithms are very practical because they avoid the strong assumption that there must exist two servers without collusion. The proposed algorithms not only protect the privacy of the exponent and the base simultaneously, but also enable users to verify the correctness of the result returned by the cloud with high probability. Compared with using the square-and-multiply algorithm, the user can achieve higher efficiency by using the proposed algorithms. Besides, we prove the security of our algorithms and conduct several experiments to demonstrate the efficiency of the proposed algorithms. Finally, we show that the proposed algorithms can be used to construct the secure outsourcing algorithms for Shamir’s identity-based signature and identity-based multi-signature.


2013 ◽  
Vol E96.D (8) ◽  
pp. 1811-1825 ◽  
Author(s):  
Thanh Duc NGO ◽  
Hung Thanh VU ◽  
Duy-Dinh LE ◽  
Shin'ichi SATOH

Author(s):  
Tim Kittel ◽  
Catrin Ciemer ◽  
Nastaran Lotfi ◽  
Thomas Peron ◽  
Francisco Rodrigues ◽  
...  

AbstractEpisodically occurring internal (climatic) and external (non-climatic) disruptions of normal climate variability are known to both affect spatio-temporal patterns of global surface air temperatures (SAT) at time-scales between multiple weeks and several years. The magnitude and spatial manifestation of the corresponding effects depend strongly on the specific type of perturbation and may range from weak spatially coherent yet regionally confined trends to a global reorganization of co-variability due to the excitation or inhibition of certain large-scale teleconnectivity patterns. Here, we employ functional climate network analysis to distinguish qualitatively the global climate responses to different phases of the El Niño–Southern Oscillation (ENSO) from those to the three largest volcanic eruptions since the mid-20th century as the two most prominent types of recurrent climate disruptions. Our results confirm that strong ENSO episodes can cause a temporary breakdown of the normal hierarchical organization of the global SAT field, which is characterized by the simultaneous emergence of consistent regional temperature trends and strong teleconnections. By contrast, the most recent strong volcanic eruptions exhibited primarily regional effects rather than triggering additional long-range teleconnections that would not have been present otherwise. By relying on several complementary network characteristics, our results contribute to a better understanding of climate network properties by differentiating between climate variability reorganization mechanisms associated with internal variability versus such triggered by non-climatic abrupt and localized perturbations.


2004 ◽  
Vol 43 (7B) ◽  
pp. 4465-4470 ◽  
Author(s):  
Dongmok Whang ◽  
Song Jin ◽  
Charles M. Lieber

Sign in / Sign up

Export Citation Format

Share Document