Sciweavers

101 search results - page 11 / 21
» A Classification of Time and or Probability Dependent Securi...
Sort
View
PET
2009
Springer
14 years 2 months ago
Using Linkability Information to Attack Mix-Based Anonymity Services
There exist well established models for anonymity focusing on traffic analysis, i. e., analysing properties of single messages as, e. g., timing. However there is only little work ...
Stefan Schiffner, Sebastian Clauß
PUC
2010
122views more  PUC 2010»
13 years 5 months ago
What is happening now? Detection of activities of daily living from simple visual features
We propose and investigate a paradigm for activity recognition, distinguishing the ‘on-going activity’ recognition task (OGA) from that addressing ‘complete activities’ (C...
Bruno Lepri, Nadia Mana, Alessandro Cappelletti, F...
SP
2000
IEEE
105views Security Privacy» more  SP 2000»
13 years 12 months ago
Open Source in Security: Visiting the Bizarre
Although open-source software development has virtues, there is reason to believe that the approach would not have a significant effect on the security of today’s systems. The ...
Fred B. Schneider
ESORICS
2002
Springer
14 years 7 months ago
Computational Probabilistic Non-interference
In recent times information flow and non-interference have become very popular concepts for expressing both integrity and privacy properties. We present the first general definitio...
Michael Backes, Birgit Pfitzmann

Book
3101views
15 years 6 months ago
Steven Shreve: Stochastic Calculus and Finance
This is a great draft book about stochastic calculus and finance. It covers large number of topics such as Introduction to Probability Theory, Conditional Expectation, Arbitrage Pr...
Prasad Chalasani, Somesh Jha