Sciweavers

2421 search results - page 150 / 485
» Message from the Co-Chairs
Sort
View
IS
2011
13 years 1 months ago
Detecting proximity events in sensor networks
Sensor networks are often used to perform monitoring tasks, such as animal and vehicle tracking, or the surveillance of enemy forces in military applications. In this paper we int...
Antonios Deligiannakis, Yannis Kotidis
ACNS
2011
Springer
244views Cryptology» more  ACNS 2011»
13 years 27 days ago
Quantitatively Analyzing Stealthy Communication Channels
Abstract. Attackers in particular botnet controllers use stealthy messaging systems to set up large-scale command and control. Understanding the capacity of such communication chan...
Patrick Butler, Kui Xu, Danfeng (Daphne) Yao
AGI
2011
13 years 27 days ago
Compression and Intelligence: Social Environments and Communication
Compression has been advocated as one of the principles which pervades inductive inference and prediction - and, from there, it has also been recurrent in definitions and tests of...
David L. Dowe, José Hernández-Orallo...
CHI
2011
ACM
13 years 26 days ago
Name that tune: musicons as reminders in the home
In this paper we argue that Musicons, short samples from pieces of music are a useful way to present private but memorable reminder messages. We investigated accuracy, memorabilit...
Marilyn Rose McGee-Lennon, Maria Wolters, Ross McL...
CTRSA
2011
Springer
189views Cryptology» more  CTRSA 2011»
13 years 24 days ago
Ideal Key Derivation and Encryption in Simulation-Based Security
Abstract. Many real-world protocols, such as SSL/TLS, SSH, IPsec, IEEE 802.11i, DNSSEC, and Kerberos, derive new keys from other keys. To be able to analyze such protocols in a com...
Ralf Küsters, Max Tuengerthal