Sciweavers

5511 search results - page 16 / 1103
» Security for Network Places
Sort
View
IAW
2003
IEEE
14 years 2 months ago
The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks
– Computer Networks connected to the Internet continue to be compromised and exploited by hackers. This is in spite of the fact that many networks run some type of security mecha...
John G. Levine, Richard LaBella, Henry L. Owen, Di...
ICANN
2005
Springer
14 years 2 months ago
Modelling Path Integrator Recalibration Using Hippocampal Place Cells
Abstract. The firing activities of place cells in the rat hippocampus exhibit strong correlations to the animal’s location. External (e.g. visual) as well as internal (proprioce...
Thomas Strösslin, Ricardo Chavarriaga, Denis ...
WS
2006
ACM
14 years 2 months ago
Location privacy in wireless personal area networks
Location privacy is one of the major security problems in a Wireless Personal Area Network (WPAN). By eavesdropping on the transmitted packets, an attacker can keep track of the p...
Dave Singelée, Bart Preneel
STOC
2005
ACM
132views Algorithms» more  STOC 2005»
14 years 9 months ago
Concurrent general composition of secure protocols in the timing model
In the setting of secure multiparty computation, a set of parties wish to to jointly compute some function of their input (i.e., they wish to securely carry out some distributed t...
Yael Tauman Kalai, Yehuda Lindell, Manoj Prabhakar...
PVLDB
2011
13 years 3 months ago
Hyper-local, directions-based ranking of places
Studies find that at least 20% of web queries have local intent; and the fraction of queries with local intent that originate from mobile properties may be twice as high. The eme...
Petros Venetis, Hector Gonzalez, Christian S. Jens...