-
Cryptoanalysis of a key exchange protocol based on a congruence-simple semiring action
Authors:
Otero Sanchez Alvaro,
Lopez Ramos Juan Antonio
Abstract:
We show that a previously introduced key exchange based on a congruence-simple semiring action is not secure by providing an attack that reveals the shared key from the distributed public information for any of such semirings
We show that a previously introduced key exchange based on a congruence-simple semiring action is not secure by providing an attack that reveals the shared key from the distributed public information for any of such semirings
△ Less
Submitted 13 February, 2024;
originally announced February 2024.
-
AI and Holistic Review: Informing Human Reading in College Admissions
Authors:
AJ Alvero,
Noah Arthurs,
anthony lising antonio,
Benjamin W. Domingue,
Ben Gebre-Medhin,
Sonia Giebel,
Mitchell L. Stevens
Abstract:
College admissions in the United States is carried out by a human-centered method of evaluation known as holistic review, which typically involves reading original narrative essays submitted by each applicant. The legitimacy and fairness of holistic review, which gives human readers significant discretion over determining each applicant's fitness for admission, has been repeatedly challenged in co…
▽ More
College admissions in the United States is carried out by a human-centered method of evaluation known as holistic review, which typically involves reading original narrative essays submitted by each applicant. The legitimacy and fairness of holistic review, which gives human readers significant discretion over determining each applicant's fitness for admission, has been repeatedly challenged in courtrooms and the public sphere. Using a unique corpus of 283,676 application essays submitted to a large, selective, state university system between 2015 and 2016, we assess the extent to which applicant demographic characteristics can be inferred from application essays. We find a relatively interpretable classifier (logistic regression) was able to predict gender and household income with high levels of accuracy. Findings suggest that data auditing might be useful in informing holistic review, and perhaps other evaluative systems, by checking potential bias in human or computational readings.
△ Less
Submitted 17 December, 2019;
originally announced December 2019.
-
An Approach to Log Management: Prototy** a Design of Agent for Log Harvesting
Authors:
Mayol Arnao Reinaldo,
Nuñez Luis A.,
Lobo Antonio
Abstract:
This paper describes a work in progress implementing a solution for harvesting and transporting information logs from network devices in a e-science environment. The system is composed for servers, agents, active devices and a transporting protocol. This document describes the state of development of agents. Agents capture logs from devices, normalize, reduce and cataloged them by using metadata.…
▽ More
This paper describes a work in progress implementing a solution for harvesting and transporting information logs from network devices in a e-science environment. The system is composed for servers, agents, active devices and a transporting protocol. This document describes the state of development of agents. Agents capture logs from devices, normalize, reduce and cataloged them by using metadata. Once all these processes are done, they transmit the cataloged data by using Transportation Protocol to a warehouse server. Also an agent use orchestration parameters to transmit modified logs to a data warehouse server. These parameters can be received from orchestration applications such as Taverna. The operation of the agents and the communication protocol solve some of the deficiencies of traditional logs management protocols. Finally, we show some test realized over the new prototype.
△ Less
Submitted 4 December, 2011;
originally announced December 2011.