Sciweavers

8 search results - page 1 / 2
» acns 2011
Sort
View
BIOINFORMATICS
2011
13 years 5 months ago
QuACN: an R package for analyzing complex biological networks quantitatively
Laurin A. J. Mueller, Karl G. Kugler, Andreas Dand...
ACNS
2011
Springer
283views Cryptology» more  ACNS 2011»
13 years 2 months ago
On Hiding a Plaintext Length by Preencryption
It is a well known fact that encryption schemes cannot hide a plaintext length when it is unbounded. We thus admit that an approximation of it may leak and we focus on hiding its p...
Cihangir Tezcan, Serge Vaudenay
ACNS
2011
Springer
231views Cryptology» more  ACNS 2011»
13 years 2 months ago
Cold Boot Key Recovery by Solving Polynomial Systems with Noise
A method for extracting cryptographic key material from DRAM used in modern computers has been recently proposed in [9]; the technique was called Cold Boot attacks. When considerin...
Martin Albrecht, Carlos Cid
ACNS
2011
Springer
237views Cryptology» more  ACNS 2011»
13 years 2 months ago
Private Discovery of Common Social Contacts
The increasing use of computing devices for social interactions propels the proliferation of online social applications, yet, it prompts a number of privacy concerns. One common p...
Emiliano De Cristofaro, Mark Manulis, Bertram Poet...
ACNS
2011
Springer
244views Cryptology» more  ACNS 2011»
13 years 2 months ago
Quantitatively Analyzing Stealthy Communication Channels
Abstract. Attackers in particular botnet controllers use stealthy messaging systems to set up large-scale command and control. Understanding the capacity of such communication chan...
Patrick Butler, Kui Xu, Danfeng (Daphne) Yao