Sciweavers

2047 search results - page 208 / 410
» Pervasive Computing on Active Networks
Sort
View
CRYPTO
2003
Springer
111views Cryptology» more  CRYPTO 2003»
15 years 9 months ago
Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication
In this paper we present a very practical ciphertext-only cryptanalysis of GSM (Global System for Mobile communications) encrypted communication, and various active attacks on the ...
Elad Barkan, Eli Biham, Nathan Keller
IJON
2007
120views more  IJON 2007»
15 years 4 months ago
Comparison of dynamical states of random networks with human EEG
Existing models of EEG have mainly focused on relations to network dynamics characterized by firing rates [L. de Arcangelis, H.J. Herrmann, C. Perrone-Capano, Activity-dependent ...
Ralph Meier, Arvind Kumar, Andreas Schulze-Bonhage...
130
Voted
AINA
2010
IEEE
15 years 9 months ago
InnoDB Database Forensics
— Whenever data is being processed, there are many places where parts of the data are temporarily stored; thus forensic analysis can reveal past activities, create a (partial) ti...
Peter Fruhwirt, Marcus Huber, Martin Mulazzani, Ed...
NSDI
2008
15 years 7 months ago
Conducting Cybersecurity Research Legally and Ethically
The primary legal obstacles to conducting cybersecurity are not outright prohibitions but rather the difficulty of determining which of a large set of complex statutes might regul...
Aaron J. Burstein
111
Voted
WEBNET
1998
15 years 6 months ago
Web-Enabled Distance Education Environment
: As the new network computer technology forces into every aspect of daily life, many things change in a rather rapid way, compared to what we were used to until recently. One of t...
Christos Bouras, Petros Lampsas, Antonis Bazaios, ...