Sciweavers

1730 search results - page 273 / 346
» Open Archiving for Open Research
Sort
View
IACR
2011
127views more  IACR 2011»
13 years 9 months ago
Cryptanalysis of KeeLoq code-hopping using a Single FPGA
The KeeLoq cipher is used in many wireless car door systems and garage openers. Recently the algorithm was studied and several attacks have been published. When a random seed is no...
Idan Sheetrit, Avishai Wool
COMSNETS
2012
205views more  COMSNETS 2012»
13 years 5 months ago
RODEO: Robust and rapidly deployable TDM mesh with QoS differentiation
Abstract—We present RODEO, a RObust and rapidly DEplOyable wireless mesh network designed for applications such as disaster management. Natural disasters often destroy existing c...
Aniesh Chawla, Vinay Yadav, Vasu Dev Sharma, Jitin...
CSCW
2012
ACM
13 years 5 months ago
Building for social translucence: a domain analysis and prototype system
The relationships and work that facilitate content creation in large online contributor system are not always visible. Social translucence is a stance toward the design of systems...
David W. McDonald, Stephanie Gokhman, Mark Zachry
HICSS
2012
IEEE
293views Biometrics» more  HICSS 2012»
13 years 5 months ago
Api-do: Tools for Exploring the Wireless Attack Surface in Smart Meters
—Security will be critical for the wireless interface offered by soon-to-be-ubiquitous smart meters — since if not secure, this technology will provide an remotely accessible a...
Travis Goodspeed, Sergey Bratus, Ricky Melgares, R...
ICDE
2012
IEEE
246views Database» more  ICDE 2012»
13 years 8 days ago
HiCS: High Contrast Subspaces for Density-Based Outlier Ranking
—Outlier mining is a major task in data analysis. Outliers are objects that highly deviate from regular objects in their local neighborhood. Density-based outlier ranking methods...
Fabian Keller, Emmanuel Müller, Klemens B&oum...