Sciweavers

463 search results - page 31 / 93
» Discovering communication
Sort
View
SACRYPT
2007
Springer
145views Cryptology» more  SACRYPT 2007»
14 years 2 months ago
Passive-Only Key Recovery Attacks on RC4
Abstract. We present several weaknesses in the key scheduling algorithm of RC4 when the secret key contains an initialization vector – a cryptographic scheme typically used by th...
Serge Vaudenay, Martin Vuagnoux
ICPPW
2002
IEEE
14 years 1 months ago
Localized Group Membership Service for Ad Hoc Networks
We present a specification for a new, localized group membership service that maintains the membership status of adjacent nodes – called neighbors – in a mobile distributed s...
Linda Briesemeister, Günter Hommel
CSEE
2007
Springer
14 years 2 months ago
Student Project Collaboration Using Wikis
A wiki is a web tool that allows users to easily create and edit web pages collaboratively. The ease-of-editing feature and accessibility from anywhere by anyone make wikis ideal ...
Joseph Chao
ICC
2009
IEEE
142views Communications» more  ICC 2009»
14 years 3 months ago
Revealing Social Networks of Spammers Through Spectral Clustering
—To date, most studies on spam have focused only on the spamming phase of the spam cycle and have ignored the harvesting phase, which consists of the mass acquisition of email ad...
Kevin S. Xu, Mark Kliger, Yilun Chen, Peter J. Woo...
SIGSOFT
2008
ACM
14 years 9 months ago
Automated identification of parameter mismatches in web applications
Quality assurance techniques for web applications have become increasingly important as web applications have gained in popularity and become an essential part of our daily lives....
William G. J. Halfond, Alessandro Orso