Sciweavers

13534 search results - page 2600 / 2707
» Modelling Human-Computer Interaction
Sort
View
125
Voted
ASIACRYPT
2008
Springer
15 years 4 months ago
A Modular Security Analysis of the TLS Handshake Protocol
We study the security of the widely deployed Secure Session Layer/Transport Layer Security (TLS) key agreement protocol. Our analysis identifies, justifies, and exploits the modul...
Paul Morrissey, Nigel P. Smart, Bogdan Warinschi
159
Voted
EUROCRYPT
2008
Springer
15 years 3 months ago
Efficient Two Party and Multi Party Computation Against Covert Adversaries
Recently, Aumann and Lindell introduced a new realistic security model for secure computation, namely, security against covert adversaries. The main motivation was to obtain secure...
Vipul Goyal, Payman Mohassel, Adam Smith
DIMVA
2010
15 years 3 months ago
Take a Deep Breath: A Stealthy, Resilient and Cost-Effective Botnet Using Skype
Abstract. Skype is one of the most used P2P applications on the Internet: VoIP calls, instant messaging, SMS and other features are provided at a low cost to millions of users. Alt...
Antonio Nappa, Aristide Fattori, Marco Balduzzi, M...
98
Voted
LREC
2010
155views Education» more  LREC 2010»
15 years 3 months ago
WTIMIT: The TIMIT Speech Corpus Transmitted Over The 3G AMR Wideband Mobile Network
Due to upcoming mobile telephony services with higher speech quality, a wideband (50 Hz to 7 kHz) mobile telephony derivative of TIMIT has been recorded called WTIMIT. It allows a...
Patrick Bauer, David Scheler, Tim Fingscheidt
IIWAS
2008
15 years 3 months ago
Application framework with demand-driven mashup for selective browsing
Abstract: We are developing a new mashup framework for creating flexible applications in which users can selectively browse through mashup items. The framework provides GUI compone...
Sohei Ikeda, Takakazu Nagamine, Tomio Kamada
« Prev « First page 2600 / 2707 Last » Next »