Sciweavers

1191 search results - page 71 / 239
» Online Games and Security
Sort
View
CRYPTO
2001
Springer
117views Cryptology» more  CRYPTO 2001»
14 years 18 days ago
Online Ciphers and the Hash-CBC Construction
We initiate a study of on-line ciphers. These are ciphers that can take input plaintexts of large and varying lengths and will output the ith block of the ciphertext after having p...
Mihir Bellare, Alexandra Boldyreva, Lars R. Knudse...
CDC
2009
IEEE
122views Control Systems» more  CDC 2009»
13 years 9 months ago
Dynamic policy-based IDS configuration
Intrusion Detection System (IDS) is an important security enforcement tool in modern networked information systems. Obtaining an optimal IDS configuration for effective detection o...
Quanyan Zhu, Tamer Basar
CHI
2010
ACM
14 years 2 months ago
Improving social game engagement on facebook through enhanced socio-contextual information
In this paper we describe the results of a controlled study of a social game, Magpies, which was built on the Facebook Online Social Network (OSN) and enhanced with contextual soc...
Ben Kirman, Shaun Lawson, Conor Linehan, Francesco...
CSCW
2008
ACM
13 years 10 months ago
Game design principles in everyday fitness applications
The global obesity epidemic has prompted our community to explore the potential for technology to play a stronger role in promoting healthier lifestyles. Although there are severa...
Taj Campbell, Brian Ngo, James Fogarty
CRITIS
2007
13 years 9 months ago
A Malware Detector Placement Game for Intrusion Detection
We propose and investigate a game-theoretic approach to the malware filtering and detector placement problem which arises in network security. Our main objective is to develop opt...
Stephan Schmidt, Tansu Alpcan, Sahin Albayrak, Tam...