Sciweavers

39 search results - page 3 / 8
» A First Step Towards the Automatic Generation of Security Pr...
Sort
View
ESORICS
2009
Springer
14 years 8 months ago
ReFormat: Automatic Reverse Engineering of Encrypted Messages
Automatic protocol reverse engineering has recently received significant attention due to its importance to many security applications. However, previous methods are all limited in...
Zhi Wang, Xuxian Jiang, Weidong Cui, Xinyuan Wang,...
ATAL
2010
Springer
13 years 8 months ago
Capturing and generating social behavior with the restaurant game
The Restaurant Game demonstrates an end-to-end system that captures and generates social behavior for virtual agents. Over 15,000 people have played The Restaurant Game, and we ha...
Jeff Orkin, Deb K. Roy
GLOBECOM
2009
IEEE
14 years 2 months ago
MAC Protocol Engine for Sensor Networks
—We present a novel approach for Medium Access Control (MAC) protocol design based on protocol engine. Current way of designing MAC protocols for a specific application is based...
Sinem Coleri Ergen, Piergiuseppe Di Marco, Carlo F...
CCS
2010
ACM
13 years 4 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
FGR
2006
IEEE
154views Biometrics» more  FGR 2006»
13 years 11 months ago
Toward an Efficient and Accurate AAM Fitting on Appearance Varying Faces
Automatic extraction of facial feature deformations (either due to identity change or expression) is a challenging task and could be the base of a facial expression interpretation...
Hugo Mercier, Julien Peyras, Patrice Dalle