Sciweavers

1443 search results - page 137 / 289
» Aging Users are Still Users
Sort
View
101
Voted
EUROSEC
2009
ACM
15 years 7 months ago
Application-based TCP hijacking
We present application-based TCP hijacking (ABTH), a new attack on TCP applications that exploits flaws due to the interplay between TCP and application protocols to inject data ...
Oliver Zheng, Jason Poon, Konstantin Beznosov
104
Voted
WISA
2009
Springer
15 years 7 months ago
Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application
In Ciphertext-Policy Attribute-Based Encryption (CP-ABE), a user secret key is associated with a set of attributes, and the ciphertext is associated with an access policy over attr...
Luan Ibraimi, Milan Petkovic, Svetla Nikova, Piete...
101
Voted
CIKM
2009
Springer
15 years 7 months ago
Privacy-enhanced public view for social graphs
We consider the problem of releasing a limited public view of a sensitive graph which reveals at least k edges per node. We are motivated by Facebook’s public search listings, w...
Hyoungshick Kim, Joseph Bonneau
CLUSTER
2008
IEEE
15 years 7 months ago
Empirical-based probabilistic upper bounds for urgent computing applications
—Scientific simulation and modeling often aid in making critical decisions in such diverse fields as city planning, severe weather prediction and influenza modeling. In some o...
Nick Trebon, Peter H. Beckman
104
Voted
ICPR
2008
IEEE
15 years 7 months ago
Intuitive event modeling for personalized behavior monitoring
Behavior understanding and semantic interpretation of dynamic visual scenes have attracted a lot of attention in computer vision research community. Although the use of surveillan...
Ahmed Azough, Alexandre Delteil, Fabien De Marchi,...