Sciweavers

978 search results - page 23 / 196
» Knowledge, Probability, and Adversaries
Sort
View
ICWSM
2008
13 years 8 months ago
Social Access Control for Social Media Using Shared Knowledge Questions
Managing privacy of online content is difficult. We present a simple social access control where sharers specify test questions of shared knowledge, such as "what is our scho...
Michael Toomim, Xianhang Zhang, James Fogarty, Nat...
PERCOM
2009
ACM
14 years 2 months ago
Distributed Detection of Replicas with Deployment Knowledge in Wireless Sensor Networks
—Due to the unattended nature of wireless sensor networks, an adversary can easily capture and compromise sensor nodes, generate replicas of those compromised nodes, and mount a ...
Jun-Won Ho, Donggang Liu, Matthew Wright, Sajal K....
ISIPTA
1999
IEEE
116views Mathematics» more  ISIPTA 1999»
13 years 11 months ago
On the Distribution of Natural Probability Functions
The purpose of this note is to describe the underlying insights and results obtained by the authors, and others, in a series of papers aimed at modelling the distribution of `natu...
Jeff B. Paris, Paul N. Watton, George M. Wilmers
CSR
2008
Springer
13 years 9 months ago
Public Key Encryption and Encryption Emulation Attacks
The main purpose of this paper is to show that public key encryption can be secure against the "encryption emulation" attack (on the sender's encryption) by computat...
Denis Osin, Vladimir Shpilrain
COLOGNETWENTE
2010
13 years 6 months ago
Approximating Independent Set in Semi-Random Graphs
We present an algorithm for the independent set problem on semi-random graphs, which are generated as follows: An adversary chooses an n-vertex graph, and then each edge is flipp...
Bodo Manthey, Kai Plociennik