Sciweavers

1191 search results - page 71 / 239
» Online Games and Security
Sort
View
CRYPTO
2001
Springer
117views Cryptology» more  CRYPTO 2001»
15 years 3 months ago
Online Ciphers and the Hash-CBC Construction
We initiate a study of on-line ciphers. These are ciphers that can take input plaintexts of large and varying lengths and will output the ith block of the ciphertext after having p...
Mihir Bellare, Alexandra Boldyreva, Lars R. Knudse...
CDC
2009
IEEE
122views Control Systems» more  CDC 2009»
15 years 9 days ago
Dynamic policy-based IDS configuration
Intrusion Detection System (IDS) is an important security enforcement tool in modern networked information systems. Obtaining an optimal IDS configuration for effective detection o...
Quanyan Zhu, Tamer Basar
CHI
2010
ACM
15 years 5 months ago
Improving social game engagement on facebook through enhanced socio-contextual information
In this paper we describe the results of a controlled study of a social game, Magpies, which was built on the Facebook Online Social Network (OSN) and enhanced with contextual soc...
Ben Kirman, Shaun Lawson, Conor Linehan, Francesco...
CSCW
2008
ACM
15 years 1 months ago
Game design principles in everyday fitness applications
The global obesity epidemic has prompted our community to explore the potential for technology to play a stronger role in promoting healthier lifestyles. Although there are severa...
Taj Campbell, Brian Ngo, James Fogarty
CRITIS
2007
15 years 23 days ago
A Malware Detector Placement Game for Intrusion Detection
We propose and investigate a game-theoretic approach to the malware filtering and detector placement problem which arises in network security. Our main objective is to develop opt...
Stephan Schmidt, Tansu Alpcan, Sahin Albayrak, Tam...