Sciweavers

CSE
2009
IEEE
13 years 11 months ago
A Framework to Balance Privacy and Data Usability Using Data Degradation
—Personal data is a valuable asset for service providers. To collect such data, free services are offered to users, for whom the risk of loosing privacy by subscribing to a servi...
Harold van Heerde, Maarten M. Fokkinga, Nicolas An...
CSE
2009
IEEE
13 years 11 months ago
Towards Automating Social Engineering Using Social Networking Sites
—A growing number of people use social networking sites to foster social relationships among each other. While the advantages of the provided services are obvious, drawbacks on a...
Markus Huber, Stewart Kowalski, Marcus Nohlberg, S...
CSE
2009
IEEE
13 years 11 months ago
Ceremonies Formal Analysis in PKI's Context
—Ceremonies are a useful tool to establish trust in scenarios where protocols operate. They describe a greater range of issues not taken into account by protocol designers. We ta...
Jean Everson Martina, Túlio Cicero Salvaro ...
CSE
2009
IEEE
13 years 11 months ago
Performance Analysis of an HMM-Based Gesture Recognition Using a Wristwatch Device
—Interaction with mobile devices that are intended for everyday use is challenging since such systems are continuously optimized towards small outlines. Watches are a particularl...
Roman Amstutz, Oliver Amft, Brian French, Asim Sma...
CSE
2009
IEEE
13 years 11 months ago
HACK: A Health-Based Access Control Mechanism for Dynamic Enterprise Environments
—Current access control schemes focus on the user and their rights and privileges relating to the access to both initiating functionality and accessing information. This approach...
Chenjia Wang, Kevin P. Monaghan, Weisong Shi
CSE
2009
IEEE
13 years 11 months ago
Reprogrammable Module-Linker for Energy-Efficient Wireless Sensor Networks
Seung-Ku Kim, Jae-Ho Lee, Kwang-il Hwang, Kyeong H...
CSE
2009
IEEE
13 years 11 months ago
Bio-chaotic Stream Cipher-Based Iris Image Encryption
Conventional cryptography uses encryption key, which are long bit strings and are very hard to memorize such a long random numbers. Also it can be easily attacked by using the brut...
Abdullah Sharaf Alghamdi, Hanif Ullah, Maqsood Mah...
CSE
2009
IEEE
13 years 11 months ago
Key Predistribution Schemes Using Block Designs in Wireless Sensor Networks
We present a deterministic Key Predistribution scheme in Wireless Sensor Networks (WSN) using combinatorial designs. The design finds application where a large number sensor node...
Sushmita Ruj, Jennifer Seberry, Bimal K. Roy
CSE
2009
IEEE
13 years 11 months ago
Analysing BitTorrent's Seeding Strategies
Abstract— BitTorrent is a typical peer-to-peer (P2P) file distribution application that has gained tremendous popularity in recent years. A considerable amount of research exists...
Xinuo Chen, Stephen A. Jarvis