Sciweavers

1653 search results - page 220 / 331
» Timed analysis of security protocols
Sort
View
MICCAI
2003
Springer
14 years 11 months ago
Exploratory Identification of Cardiac Noise in fMRI Images
A fast exploratory framework for extracting cardiac noise signals contained in rest-case fMRI images is presented. Highly autocorrelated, independent components of the input time ...
Lilla Zöllei, Lawrence P. Panych, W. Eric L. ...
CHI
2007
ACM
14 years 10 months ago
Noticing notice: a large-scale experiment on the timing of software license agreements
Spyware is an increasing problem. Interestingly, many programs carrying spyware honestly disclose the activities of the software, but users install the software anyway. We report ...
Nathaniel Good, Jens Grossklags, Deirdre K. Mullig...
INFOCOM
2010
IEEE
13 years 8 months ago
From Time Domain to Space Domain: Detecting Replica Attacks in Mobile Ad Hoc Networks
—A common vulnerability of wireless networks, in particular, the mobile ad hoc network (MANET), is their susceptibility to node compromise/physical capture attacks since the wire...
Kai Xing, Xiuzhen Cheng
EUROCRYPT
2009
Springer
14 years 10 months ago
Key Agreement from Close Secrets over Unsecured Channels
We consider information-theoretic key agreement between two parties sharing somewhat different versions of a secret w that has relatively little entropy. Such key agreement, also ...
Bhavana Kanukurthi, Leonid Reyzin
CONEXT
2005
ACM
14 years 1 days ago
Root cause analysis for long-lived TCP connections
While the applications using the Internet have changed over time, TCP is still the dominating transport protocol that carries over 90% of the total traffic. Throughput is the key...
Matti Siekkinen, Guillaume Urvoy-Keller, Ernst W. ...