Authenticated session key establishment is a central issue in network security. This paper addresses a question on whether we can design a compact, efficient and authenticated key ...
— In current peer-to-peer systems users interact with unknown services and users for the purpose of online transactions such as file sharing and trading of commodities. Peer-to-...
Current business conditions have given rise to distributed teams that are mostly collocated except for one remote member. These “hub-and-satellite” teams face the challenge of...
Gina Venolia, John C. Tang, Ruy Cervantes, Sara Bl...
We propose a space-time Markov Random Field (MRF)
model to detect abnormal activities in video. The nodes in
the MRF graph correspond to a grid of local regions in the
video fra...
Jaechul Kim (University of Texas at Austin), Krist...
Network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate “stepping stones” to conceal their identity and origin...