SwePub
Sök i SwePub databas

  Extended search

Träfflista för sökning "WFRF:(Jacobsson Andreas 1972 ) "

Search: WFRF:(Jacobsson Andreas 1972 )

  • Result 1-10 of 33
Sort/group result
   
EnumerationReferenceCoverFind
1.
  • Dahlbom, L, et al. (author)
  • Gender and Overconfidence : Are Girls really overconfident?
  • 2011
  • In: Applied Economics Letters. - : Taylor & Francis. - 1350-4851 .- 1466-4291. ; 18:4, s. 325-327
  • Journal article (peer-reviewed)abstract
    • Previous research finds that people are overconfident and that men are more overconfident than women. Using a very precise confidence measure, this article shows, however, that whereas boys are overconfident, girls are actually underconfident regarding their mathematics performance. We conducted a survey where 14-year-old high school students were asked what grade they thought they would get in a mathematics test a week later. These results were then compared with their actual grade. Boys were overconfident about their grades, whereas girls were underconfident.
  •  
2.
  • Gebremichael, Teklay, 1985- (author)
  • Lightweight Cryptographic Group Key Management Protocols for the Internet of Things
  • 2019
  • Licentiate thesis (other academic/artistic)abstract
    • The Internet of Things (IoT) is increasingly becoming an integral component of many applications in consumer, industrial and other areas. Notions such as smart industry, smart transport, and smart world are, in large part, enabled by IoT. At its core, the IoT is underpinned by a group of devices, such as sensors and actuators, working collaboratively to provide a required service. One of the important requirements most IoT applications are expected to satisfy is ensuring the security and privacy of users. Security is an umbrella term that encompasses notions such as confidentiality, integrity and privacy, that are typically achieved using cryptographic encryption techniques.A special form of communication common in many IoT applications is group communication, where there are two or more recipients of a given message. In or-der to encrypt a message broadcast to a group, it is required that the participating parties agree on a group key a priori. Establishing and managing a group key in IoT environments, where devices are resources-constrained and groups are dynamic, is a non-trivial problem. The problem presents unique challenges with regard to con-structing protocols from lightweight and secure primitives commensurate with the resource-constrained nature of devices and maintaining security as devices dynamically leave or join a group.This thesis presents lightweight group key management protocols proposed to address the aforementioned problem, in a widely adopted model of a generic IoT network consisting of a gateway with reasonable computational power and a set of resource-constrained nodes. The aim of the group key management protocols is to enable the gateway and the set of resource-constrained devices to establish and manage a group key, which is then used to encrypt group messages. The main problems the protocols attempt to solve are establishing a group key among participating IoT devices in a secure and computationally feasible manner; enabling additionor removal of a device to the group in a security preserving manner; and enabling generation of a group session key in an efficient manner without re-running the protocol from scratch. The main challenge in designing such protocols is ensuring that the computations that a given IoT device performs as part of participating in the protocol are computationally feasible during initial group establishment, group keyupdate, and adding or removing a node from the group.The work presented in this thesis shows that the challenge can be overcome by designing protocols from lightweight cryptographic primitives. Specifically, protocols that exploit the lightweight nature of crypto-systems based on elliptic curves and the perfect secrecy of the One Time Pad (OTP) are presented. The protocols are designed in such a way that a resource-constrained member node performs a constant number of computationally easy computations during all stages of the group key management process.To demonstrate that the protocols are practically feasible, implementation resultof one of the protocols is also presented, showing that the protocol outperforms similar state-of-the-art protocols with regard to energy consumption, execution time, memory usage and number of messages generated.
  •  
3.
  • Blomberg, Jeanette, 1977-, et al. (author)
  • Reduced FAS transcription in clones of U937 cells that have acquired resistance to Fas-induced apoptosis
  • 2009
  • In: The FEBS Journal. - : Wiley. - 1742-464X .- 1742-4658. ; 276:2, s. 497-508
  • Journal article (peer-reviewed)abstract
    • Susceptibility to cell death is a prerequisite for the elimination of tumour cells by cytotoxic immune cells, chemotherapy or irradiation. Activation of the death receptor Fas is critical for the regulation of immune cell homeostasis and efficient killing of tumour cells by apoptosis. To define the molecular changes that occur during selection for insensitivity to Fas-induced apoptosis, a resistant variant of the U937 cell line was established. Individual resistant clones were isolated and characterized. The most frequently observed defect in the resistant cells was reduced Fas expression, which correlated with decreased FAS transcription. Clones with such reduced Fas expression also displayed partial cross-resistance to tumour necrosis factor-alpha stimulation, but the mRNA expression of tumour necrosis factor receptors was not decreased. Reintroduction of Fas conferred susceptibility to Fas but not to tumour necrosis factor-alpha stimulation, suggesting that several alterations could be present in the clones. The reduced Fas expression could not be explained by mutations in the FAS coding sequence or promoter region, or by silencing through methylations. Protein kinase B and extracellular signal-regulated kinase, components of signalling pathways downstream of Ras, were shown to be activated in some of the resistant clones, but none of the three RAS genes was mutated, and experiments using chemical inhibitors could not establish that the activation of these proteins was the cause of Fas resistance as described in other systems. Taken together, the data illustrate that Fas resistance can be caused by reduced Fas expression, which is a result of an unidentified mode of regulation.
  •  
4.
  • Dervin, Fred, et al. (author)
  • Covid-19 and interculturality : First lessons for Teacher Educators
  • 2020
  • In: Education and Society. - : James Nicholas Publishers, Pty. Ltd.. - 0726-2655. ; 38:1, s. 89-106
  • Journal article (peer-reviewed)abstract
    • This exploratory article represents an attempt to examine and problematize the links between the COVID-19 crisis and interculturality for education. Aiming at teacher educators, we review problems with the notion of interculturality in light of the crisis. We argue that these problems were not created by the crisis, but that the crisis unveiled them. In the first part of the article we suggest that these issues should be approached by looking into interculturality (and companion terms such as “democracy” and “equality”) as an ideology that deserves deconstructing, unthinking, reconstructing and rethinking. We also describe the problems triggered by this ideology: the need to shift from “dead imagination” (culture, difference, etc.) to unearthing the “groundwater” of the economy and globalization in the way interculturality functions. We then propose a set of three principles that could be used by teacher educators to train future teachers to deal with interculturality afresh: “Beyond comparison”, “The mirror: turning inward”, and “Questioning the unquestionables”.
  •  
5.
  •  
6.
  •  
7.
  •  
8.
  •  
9.
  •  
10.
  •  
Skapa referenser, mejla, bekava och länka
  • Result 1-10 of 33

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view