Sciweavers

127 search results - page 25 / 26
» Gaps and future directions in mobile security research
Sort
View
CHES
2010
Springer
187views Cryptology» more  CHES 2010»
14 years 11 months ago
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs - (Full Version)
The power of side-channel leakage attacks on cryptographic implementations is evident. Today's practical defenses are typically attack-specific countermeasures against certain...
Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Re...
JSAC
2006
174views more  JSAC 2006»
14 years 10 months ago
Integrated Radio Resource Allocation for Multihop Cellular Networks With Fixed Relay Stations
Recently, the notion that a logical next step towards future mobile radio networks is to introduce multihop relaying into cellular networks, has gained wide acceptance. Nevertheles...
Yajian Liu, Reza Hoshyar, X. Yang, Rahim Tafazolli
CCR
2004
155views more  CCR 2004»
14 years 10 months ago
The dark side of the Web: an open proxy's view
With the advent of large-scale, wide-area networking testbeds, researchers can deploy long-running services that interact with other resources on the Web. While such interaction c...
Vivek S. Pai, Limin Wang, KyoungSoo Park, Ruoming ...
ISI
2006
Springer
14 years 10 months ago
An Embedded Bayesian Network Hidden Markov Model for Digital Forensics
In the paper we combine a Bayesian Network model for encoding forensic evidence during a given time interval with a Hidden Markov Model (EBN-HMM) for tracking and predicting the de...
Olivier Y. de Vel, Nianjun Liu, Terry Caelli, Tib&...
HRI
2006
ACM
15 years 4 months ago
Empirical results from using a comfort level device in human-robot interaction studies
This paper describes an extensive analysis of the comfort level data of 7 subjects with respect to 12 robot behaviours as part of a human-robot interaction trial. This includes ro...
Kheng Lee Koay, Kerstin Dautenhahn, Sarah Woods, M...