Sciweavers

1054 search results - page 102 / 211
» Secret Communication with Feedback
Sort
View
COST
2008
Springer
102views Multimedia» more  COST 2008»
14 years 12 months ago
Multimodality Issues in Conversation Analysis of Greek TV Interviews
This paper presents a study on multimodal conversation analysis of Greek TV interviews. Specifically, we examine the type of facial, hand and body gestures and their respective com...
Maria Koutsombogera, Harris Papageorgiou
CCECE
2006
IEEE
15 years 4 months ago
Control of Tele-Operation Systems Subject to Capacity Limited Channels and Uncertainty
This paper is concerned with asymptotic observability and stabilizability of dynamical systems over communication channels subject to limited transmission capacity constraint and ...
Alireza Farhadi, Charalambos D. Charalambous
ICC
2009
IEEE
174views Communications» more  ICC 2009»
15 years 4 months ago
Biometric Mobile Template Protection: A Composite Feature Based Fingerprint Fuzzy Vault
—Biometric authentication is emerging as the promising solution to conventional cryptography based authentication technologies. However, protecting users’ biometric templates s...
Kai Xi, Jiankun Hu
INFOCOM
2008
IEEE
15 years 4 months ago
iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems
—In this paper, we study a new class of attacks, the invisible LOCalization (iLOC) attack, which can accurately and invisibly localize monitors of Internet threat monitoring (ITM...
Xun Wang, Wei Yu, Xinwen Fu, Dong Xuan, Wei Zhao
CHES
2007
Springer
157views Cryptology» more  CHES 2007»
15 years 4 months ago
A Hardware-Assisted Realtime Attack on A5/2 Without Precomputations
Abstract. A5/2 is a synchronous stream cipher that is used for protecting GSM communication. Recently, some powerful attacks [2,10] on A5/2 have been proposed. In this contribution...
Andrey Bogdanov, Thomas Eisenbarth, Andy Rupp