Last 7 days
![]() Andersen, Katja Natalie ![]() in Forum für Politik, Gesellschaft und Kultur in Luxemburg (2022), 423 Cette contribution s’appuie sur les conclusions du projet European Comparison of Inclusive Teaching Materials (ITM) lancé en 2018. Cette collaboration regroupant l’Allemagne (Prof. Dr. M. Vogt, C ... [more ▼] Cette contribution s’appuie sur les conclusions du projet European Comparison of Inclusive Teaching Materials (ITM) lancé en 2018. Cette collaboration regroupant l’Allemagne (Prof. Dr. M. Vogt, C. Bierschwale), le Luxembourg (Prof. Dr. K. Andersen), la Suède (Prof. Dr. A. Bagger) et l’Italie (Prof. Dr. V. Macchia, Prof. Dr. A. Augschöll, A. Ardemagni) cherche un moyen de définir le caractère inclusif des supports pédagogiques. C’est dans cette perspective qu’a été développé un catalogue de critères permettant d’évaluer la pertinence des supports pédagogiques en vue de leur utilisation dans des contextes d’enseignement inclusif. La présente contribution présente ces critères en les mettant en parallèle avec les conclusions des recherches menées au Luxembourg. [less ▲] Detailed reference viewed: 43 (2 UL)![]() ; Scuto, Denis ![]() ![]() Book published by De Gruyter (2022) Detailed reference viewed: 52 (2 UL)![]() ; ; Wang, Qingju ![]() in Topics in Cryptology - CT-RSA 2022 - The Cryptographers' Track at the RSA Conference 2022, San Francisco, CA, USA, February 7-10, 2022, Proceedings (2022) Detailed reference viewed: 29 (1 UL)![]() Demirci, Huseyin ![]() ![]() Scientific Conference (2022) Innovative pharma-genomics and personalized medicine services are now possible thanks to the availability for processing and analysis of a large amount of genomic data. Operating on such databases, is ... [more ▼] Innovative pharma-genomics and personalized medicine services are now possible thanks to the availability for processing and analysis of a large amount of genomic data. Operating on such databases, is possible to test for predisposition to diseases by searching for genomic variants on whole genomes as well as on exomes, which are collections of protein coding regions called exons. Genomic data are therefore shared amongst research institutes, public/private operators, and third parties, creating issues of privacy, ethics, and data protection because genome data are strictly personal and identifying. To prevent damages that could follow a data breach—a likely threat nowadays—and to be compliant with current data protection regulations, genomic data files should be encrypted, and the data processing algorithms should be privacy-preserving. Such a migration is not always feasible: not all operations can be implemented straightforwardly to be privacypreserving; a privacy-preserving version of an algorithm may not be as accurate for the purpose of biomedical analysis as the original; or the privacy-preserving version may not scale up when applied to genomic data processing because of inefficiency in computation time. In this work, we demonstrate that at least for a wellknown genomic data procedure for the analysis of copy number variants called copy number variations (CNV) a privacy-preserving analysis is possible and feasible. Our algorithm relies on Homomorphic Encryption, a cryptographic technique to perform calculations directly on the encrypted data. We test our implementation for performance and reliability, giving evidence that it is practical to study copy number variations and preserve genomic data privacy. Our proof-of-concept application successfully and efficiently searches for a patient’s somatic copy number variation changes by comparing the patient gene coverage in the whole exome with a healthy control exome coverage. Since all the genomics data are securely encrypted, the data remain protected even if they are transmitted or shared via an insecure environment like a public cloud. Being this the first study for privacy-preserving copy number variation analysis, we demonstrate the potential of recent Homomorphic Encryption tools in genomic applications. [less ▲] Detailed reference viewed: 58 (3 UL)![]() Menetrey, Séverine ![]() in Revue Critique de Jurisprudence Belge (2022) Detailed reference viewed: 40 (2 UL)![]() Carr, Constance ![]() Presentation (2022) Detailed reference viewed: 31 (5 UL)![]() Cuniberti, Gilles ![]() Book published by Edward Elgar - 2nd (2022) Now in its second edition, and with significant updates and new material, Gilles Cuniberti’s innovative textbook offers a comparative treatment of private international law, a field of great importance in ... [more ▼] Now in its second edition, and with significant updates and new material, Gilles Cuniberti’s innovative textbook offers a comparative treatment of private international law, a field of great importance in an increasingly globalized world. Written by a leading voice in the field, and using a text and cases approach, this text systematically presents and compares civil law and common law approaches to issues primarily within the United Kingdom, United States, France and the EU, as well as offering additional updated insights into rules applicable in other jurisdictions such as Japan, China and Germany. Key features of the second edition include: • New topics covered in the fields of jurisdiction and foreign judgments • Original discussions surrounding the 2019 Hague Convention on Judgments and the changes contemplated by the new US Restatement on Conflict of Laws • US, EU, French and English perspectives integrated throughout the text to ensure maximum relevance and encourage students to make comparative assessments • Carefully selected extracts from primary and secondary sources that build a clear picture of the field, as well as expert analytical commentaries and questions that set these extracts in context. [less ▲] Detailed reference viewed: 27 (7 UL)![]() ; ; et al in Finance Research Letters (2022) COVID–19 is causing economic panic among people, governments, and businesses, requiring greater corporate social responsibility (CSR). Using a sample of Omani-listed firms, this study shows that CSR ... [more ▼] COVID–19 is causing economic panic among people, governments, and businesses, requiring greater corporate social responsibility (CSR). Using a sample of Omani-listed firms, this study shows that CSR budgeting and spending have increased considerably during the pandemic. It also shows that CSR budgeting is positively affected by the increase in COVID–19 deaths. CSR spending increases with the number of COVID–19 confirmed and fatal cases. These findings suggest that firms resort to CSR to reduce the negative consequences of the pandemic. [less ▲] Detailed reference viewed: 32 (2 UL)![]() ![]() Mein, Georg ![]() in Dembeck, Till; Fohrmann, Jürgen (Eds.) Die Rhetorik des Populismus und das Populäre. Körperschaftsbildung in der Gesellschaft (2022) Detailed reference viewed: 26 (0 UL)![]() Maksoud, Alexandre ![]() E-print/Working paper (2022) We generalize Waldschmidt's bound for Leopoldt's defect and prove a similar bound for Gross's defect for an arbitrary extension of number fields. As an application, we prove new cases of the generalized ... [more ▼] We generalize Waldschmidt's bound for Leopoldt's defect and prove a similar bound for Gross's defect for an arbitrary extension of number fields. As an application, we prove new cases of the generalized Gross conjecture (also known as the Gross-Kuz'min conjecture) beyond the classical abelian case, and we show that Gross's p-adic regulator has at least half of the conjectured rank. We also describe and compute non-cyclotomic analogues of Gross's defect. [less ▲] Detailed reference viewed: 35 (0 UL)![]() ; ; Maccaferri, Nicolò ![]() in Analytical Chemistry (2022), 94(2), 503-514 Detailed reference viewed: 32 (2 UL)![]() Cuniberti, Gilles ![]() in Cerqueira, Gustavo; Fulchiron, Hugues; Nord, Nicholas (Eds.) “Insécurité Juridique” – L’émergence d’une notion ? (2022) Detailed reference viewed: 21 (0 UL)![]() Wealer, Cyril ![]() in Reading and Writing (2022) The study explores whether foundational skills of reading and spelling in preschool (age 5–6) predict literacy skills cross-linguistically in an additional language in Grade 1 (age 6–7). A sample of ... [more ▼] The study explores whether foundational skills of reading and spelling in preschool (age 5–6) predict literacy skills cross-linguistically in an additional language in Grade 1 (age 6–7). A sample of linguistically diverse preschool children completed tasks of phonological awareness, letter-sound knowledge, verbal-short term memory, rapid automatized naming, and lexical knowledge in the language of preschool instruction Luxembourgish. The children were followed-up in Grade 1 where literacy skills were assessed in the language of schooling, i.e., German, after fve months of literacy instruction. German was a non-native language for all children. Longitudinal correlations confrm that individual diferences in single word/pseudoword reading and spelling in German in Grade 1 can be predicted by all the foundational literacy skills that were assessed in Luxembourgish. Path analyses showed that phonological awareness in Luxembourgish emerged as the strongest unique predictor of Grade 1 literacy skills in German. The second unique preschool predictor of Grade 1 literacy skills was letter-sound knowledge. Results are consistent with the view that literacy development in an additional language builds upon similar building blocks as literacy acquisition in a frst language, at least for languages that are typologically close. However, current fndings suggest that respective contributions between predictors and literacy skills in children learning to read in an additional language may vary from patterns observed in studies with children acquiring literacy in their frst language. [less ▲] Detailed reference viewed: 44 (8 UL)![]() Zetzsche, Dirk Andreas ![]() E-print/Working paper (2022) Detailed reference viewed: 37 (2 UL)![]() Zetzsche, Dirk Andreas ![]() E-print/Working paper (2022) Detailed reference viewed: 24 (0 UL)![]() Gil Pons, Reynaldo ![]() ![]() ![]() in IEEE Computer Security Foundations Symposium, August 7 - 10, 2022, Haifa, Israel (2022) Detailed reference viewed: 53 (10 UL)![]() Clavert, Frédéric ![]() in Weinrich, Arndt; Patin, Nicolas (Eds.) Quel Bilan Scientifique pour le Centenaire de 1914-1918? (2022) This chapter assesses the general and academic uses of social media (most particularly twitter) during the Centenary of the First World War. Detailed reference viewed: 43 (3 UL)![]() Merkoulov (merkulov), Serguei ![]() E-print/Working paper (2022) The chain gravity properad introduced earlier by the author acts on the cyclic Hochschild of any cyclic A∞ algebra equipped with a scalar product of degree −d. In particular, it acts on the cyclic ... [more ▼] The chain gravity properad introduced earlier by the author acts on the cyclic Hochschild of any cyclic A∞ algebra equipped with a scalar product of degree −d. In particular, it acts on the cyclic Hochschild complex of any Poincare duality algebra of degree d, and that action factors through a quotient dg properad ST3−d of ribbon graphs which is in focus of this paper. We show that its cohomology properad H∙(ST3−d) is highly non-trivial and that it acts canonically on the reduced equivariant homology H¯S1∙(LM) of the loop space LM of any simply connected d-dimensional closed manifold M. By its very construction, the string topology properad H∙(ST3−d) comes equipped with a morphism from the gravity properad which is fully determined by the compactly supported cohomology of the moduli spaces Mg,n of stable algebraic curves of genus g with marked points. This result gives rise to new universal operations in string topology as well as reproduces in a unified way several known constructions: we show that (i) H∙(ST3−d) is also a properad under the properad of involutive Lie bialgebras in degree 3−d whose induced action on H¯S1∙(LM) agrees precisely with the famous purely geometric construction of M. Chas and D. Sullivan, (ii) H∙(ST3−d) is a properad under the properad of homotopy involutive Lie bialgebras in degree 2−d; (iii) E. Getzler's gravity operad injects into H∙(ST3−d) implying a purely algebraic counterpart of the geometric construction of C. Westerland establishing an action of the gravity operad on H¯S1∙(LM). [less ▲] Detailed reference viewed: 44 (0 UL)![]() Vitto, Giuseppe ![]() Doctoral thesis (2022) In the modern digital world, cryptography finds its place in countless applications. However, as we increasingly use technology to perform potentially sensitive tasks, our actions and private data attract ... [more ▼] In the modern digital world, cryptography finds its place in countless applications. However, as we increasingly use technology to perform potentially sensitive tasks, our actions and private data attract, more than ever, the interest of ill-intentioned actors. Due to the possible privacy implications of cryptographic flaws, new primitives’ designs need to undergo rigorous security analysis and extensive cryptanalysis to foster confidence in their adoption. At the same time, implementations of cryptographic protocols should scale on a global level and be efficiently deployable on users’ most common devices to widen the range of their applications. This dissertation will address the security, scalability and privacy of cryptosystems by presenting new designs and cryptanalytic results regarding blockchain cryptographic primitives and public-key schemes based on elliptic curves. In Part I, I will present the works I have done in regards to accumulator schemes. More precisely, in Chapter 2, I cryptanalyze Au et al. Dynamic Universal Accumulator, by showing some attacks which can completely take over the authority who manages the accumulator. In Chapter 3, I propose a design for an efficient and secure accumulator-based authentication mechanism, which is scalable, privacy-friendly, lightweight on the users’ side, and suitable to be implemented on the blockchain. In Part II, I will report some cryptanalytical results on primitives employed or considered for adoption in top blockchain-based cryptocurrencies. In particular, in Chapter 4, I describe how the zero-knowledge proof system and the commitment scheme adopted by the privacy-friendly cryptocurrency Zcash, contain multiple subliminal channels which can be exploited to embed several bytes of tagging information in users’ private transactions. In Chapter 5, instead, I report the cryptanalysis of the Legendre PRF, employed in a new consensus mechanism considered for adoption by the blockchain-based platform Ethereum, and attacks for further generalizations of this pseudo-random function, such as the Higher-Degree Legendre PRF, the Jacobi Symbol PRF, and the Power-Residue PRF. Lastly, in Part III, I present my line of research on public-key primitives based on elliptic curves. In Chapter 6, I will describe a backdooring procedure for primes so that whenever they appear as divisors of a large integer, the latter can be efficiently factored. This technique, based on elliptic curves Complex Multiplication theory, enables to eventually generate non-vulnerable certifiable semiprimes with unknown factorization in a multi-party computation setting, with no need to run a statistical semiprimality test common to other protocols. In Chapter 7, instead, I will report some attack optimizations and specific implementation design choices that allow breaking a reduced-parameters instance, proposed by Microsoft, of SIKE, a post-quantum key-encapsulation mechanism based on isogenies between supersingular elliptic curves. [less ▲] Detailed reference viewed: 145 (17 UL)![]() Solchenbach, Karl ![]() in Schröder, Lina; Wegewitz, Markus (Eds.) Europäische Grenzregionen. Neue Wege im Umgang mit historischen Raum- und Grenzkonzeptionen in der Geschichtswissenschaft (2022) Die Ausbildung und Verfestigung der kurtrierischen und luxemburgischen Landesherrschaften war im 14. Jahrhundert weitgehend zum Abschluss gekommen. Die Transformation vom Personenverbands- zum ... [more ▼] Die Ausbildung und Verfestigung der kurtrierischen und luxemburgischen Landesherrschaften war im 14. Jahrhundert weitgehend zum Abschluss gekommen. Die Transformation vom Personenverbands- zum Flächenstaat frühneuzeitlicher Prägung hatte die Ausbildung einer zunehmend deutlicheren Grenze zwischen beiden Territorien zur Folge. Ebenso formierte sich auch eine Grenze im Grenzraum mit Frankreich und Lothringen. Die vereinfachende Darstellung komplexer teils überlagerter Grenzzonen in Form von abstrahierenden Linien musste von den zeitgenössischen Kartographen jedoch erst noch entwickelt werden. Die älteste regionale Karte mit einer angedeuteten partiellen Grenzmarkierung stammt aus dem Jahr 1555. Eine zunehmende Professionalisierung der Kartographie gelang ab der zweiten Hälfte des 16. Jahrhunderts durch Landesaufnahmen, initiiert von den jeweiligen Landesherren. Die Intention der Auftraggeber war dabei ähnlich: einerseits sollte das jeweilige Territorium durch die Karte möglichst als geschlossen beherrschter Raum dargestellt werden, andererseits galt es, die bisher nur verbal beschriebenen teils strittigen Grenzen als abstrakte Linien deutlich sichtbar zu machen. Die Karten der Landesaufnahmen waren zunächst geheim, dennoch fanden sie bereits nach wenigen Jahren Eingang in die Atlanten von Ortelius, de Jode und Mercator. Diese beeinflussten wiederum die Karten der Region in den späteren Atlanten der niederländischen, französischen und süddeutschen Kartenverleger. Der Beitrag beschreibt, ab wann und in welcher Form Grenzen in frühen Karten (16.-18. Jahrhundert) dargestellt wurden. Besonders in den Blick genommen wird der Prozess der Ausbildung von Linien zur abstrakten Darstellung unklarer, teils strittiger Grenzräume sowie die zunehmende Professionalisierung und Genauigkeit in der kartographischen Darstellung durch Vermessungen im Feld. [less ▲] Detailed reference viewed: 30 (0 UL) |
||