Sciweavers

133 search results - page 12 / 27
» Towards a Game Theoretic View of Secure Computation
Sort
View
WISEC
2009
ACM
14 years 2 months ago
Towards a theory for securing time synchronization in wireless sensor networks
Time synchronization in highly distributed wireless systems like sensor and ad hoc networks is extremely important in order to maintain a consistent notion of time throughout the ...
Murtuza Jadliwala, Qi Duan, Shambhu J. Upadhyaya, ...
SACMAT
2009
ACM
14 years 2 months ago
Towards formal security analysis of GTRBAC using timed automata
An access control system is often viewed as a state transition system. Given a set of access control policies, a general safety requirement in such a system is to determine whethe...
Samrat Mondal, Shamik Sural, Vijayalakshmi Atluri
SIGCSE
2005
ACM
240views Education» more  SIGCSE 2005»
14 years 1 months ago
A Java framework for experimentation with steganography
This article describes a Java framework for experimentation with fundamental steganographic techniques. The framework is built on top of Java's image processing libraries and...
Kenny Hunt
DIGRA
2005
Springer
14 years 1 months ago
Liberal Sims?: Simulated Difference and the Commodity of Social Diversity
This paper outlines how representations of gender, sexuality, race and ethnicity intersect with strategies of late capitalism in The Sims, arguably the most popular video game of ...
A. Brady Curlew
CSR
2009
Springer
14 years 2 months ago
A Feebly Secure Trapdoor Function
Abstract. In 1992, A. Hiltgen [1] provided the first constructions of provably (slightly) secure cryptographic primitives, namely feebly one-way functions. These functions are pro...
Edward A. Hirsch, Sergey I. Nikolenko