A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Honey chatting: A novel instant messaging system robust to eavesdropping over communication
2016
2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
Else If ≠ , M* is become false message in (a) or plausible-looking fake message in (b). Therefore, Eve(brute-force attacker) is hard to find the true message. ...
If = , the receiver can obtain a true message M in both cases. ...
ABSTRACT & INTRODUCTION
Joo-Im Kim and Ji Won Yoon / Center for Information Security Technologies (CIST), Korea University
HONEY CHATTING: A NOVEL INSTANT MESSAGING SYSTEM ROBUST TO EAVESDROPPING OVER ...
doi:10.1109/icassp.2016.7472064
dblp:conf/icassp/KimY16
fatcat:vsusevrkkzdl7bpzy7xsmqmedu
The Analysis of Cipher Padding Problem for Message Recovery Security Function of Honey Encryption
허니암호의 메시지 복구보안 기능을 위한 암호패딩 문제점 분석
2017
Journal of KIISE
허니암호의 메시지 복구보안 기능을 위한 암호패딩 문제점 분석
Honey Encryption (HE) is a technique to overcome the weakness of a brute-force attack of the existing password-based encryption (PBE). ...
By outputting a plausible plaintext even if the wrong key is entered, it provides message recovery security which an attacker can tolerate even if the attacker tries a brute-force attack against a small ...
Yoon, "Honey chatting: A novel instant messaging system robust to eavesdropping over communication 지 창 환 2005년 공주대학교 정보통신공학부 컴퓨 터전공 학사 2016년~현재 고려대학교 정보보호대학원 정보보학과 석사과정. ...
doi:10.5626/jok.2017.44.6.637
fatcat:5kv2zizmdjehvge6hddlp45p5q
The Information in Emotion Communication
[article]
2020
arXiv
pre-print
How much information is transmitted when animals use emotions to communicate? It is clear that emotions are used as communication systems in humans and other species. ...
One important application of the information theory of emotion communication is that it permits the development of emotion security systems for social networks to guard against the widespread emotion manipulation ...
Thank you to our families for their unwavering support. And, to each other. ...
arXiv:2002.08470v1
fatcat:57wauv3s7nfcdb52bamge3jbsm
Analysis of Data-At-Rest Security In Smartphones
2018
Zenodo
Based on these results we designed and evaluated a system for encryption keys management that uses wearable devices as an additional source of entropy. ...
With almost two billion users worldwide, smartphones are used for almost everything – booking a hotel, ordering a cup of coffee, or paying in a shop. ...
Most of the participants stated that they do not use SMS for highly meaningful conversations, and rather use SMS messages for friendly chats and as a way to keep in touch with their friends. ...
doi:10.5281/zenodo.3264745
fatcat:cbrrlqwup5fubjlr4ehnikdixq
A Review of Insider Threat Detection Approaches with IoT Perspective
2020
IEEE Access
Attack surfaces are significantly enlarged which could cause a severe risk in terms of company insider threat management. ...
Security professionals, government agencies, and corporate organizations have found an inherent need to prevent or mitigate attacks from insider threats. ...
To analyze text, the authors choose features from the names (character, guild, role, race, actions) and chat messages. ...
doi:10.1109/access.2020.2990195
fatcat:uxydn6lk4vdi5mtqaotp35s3oq
A Primer of Mathematical Writing, Second Edition
[article]
2016
arXiv
pre-print
This is a tract on the art and practice of mathematical writing. ...
Generally speaking, the ability to converse with multiple people in the same conversation differentiates chat rooms from instant messaging programs, which are more typically designed for one-to-one communication ...
Blogs and chat rooms and wikis and related utilities have expanded our ability to communicate with people all over the world. ...
arXiv:1612.04888v1
fatcat:lkxvvroozfdqfkivb7kmh62qte
1. Something for Nothing
[chapter]
2021
Reading Backwards
We are grateful to Adam Horsley (University of Exeter) for timely traduction, and to Jacob Emery (Indiana University) for an inspiring critique of our volume which was simultaneously astute and empathetic ...
We are grateful to our families and colleagues for their forbearance and good humour. ...
comes upon a strange, nameless man who bears witness to the moral horrors of the prison system that had been glossed over by the evangelizing Englishman. ...
doi:10.11647/obp.0241.01
fatcat:iydsaxnuqrf7rpal2yuyhhmxnu
Mud map: Australian women's experimental writing
2013
Text: Journal of the Australian Association of Writing Programs
Similarly, persuasive definition ~ there have been few who have needed to be persuaded however it does seem true that over time persuasion becomes more and more necessary. ...
~ apparently love needs to be pointed to. ...
The power lines jangled all day with their messages skittering in and out of the house. Like a message that got lost a giant dog leaned over the fence to stoop down and sniff the top of my head. ...
doi:10.52086/001c.28893
fatcat:hnauom2cvzej3ocogwmys7rs3a
Craft and control : Networks, strategies and ordering in New Zealand beekeeping
[article]
2012
These regional developments are facilitated by the emergence of information and communication technologies (ICTs) in beekeeping. ...
The new technologies are presently effecting novel forms of interaction among certain participants sharing particular sets of skills. ...
' Distribution Ust.. .. 1 feel a little uneasy about the ease at which I can 'eavesdrop' on such communications -the boundary between public and private is blurred. ...
doi:10.26021/4181
fatcat:jf7ihefyrbdv3kszotn6q5z5ky
Sharia in the city: negotiation and construction of moral space
2016
Zenodo
Even though I focus on a particular neighborhood in Chicago, my aim is to flesh out the various historical, local, and global links that form a broader, nuanced picture of sharia in the United States. ...
To this end, my analysis also takes in the broader history of Islam in the United States in order to contextualize the place and voice of the people that I present here. ...
this slice will taste, whether or not it will be 100% halal or not but it will be a challenging and fascinating moral trajectory. ...
doi:10.5281/zenodo.5912999
fatcat:74nqs6cc4jdjjnzockfbpcecpq
Analysis of data-at-rest security In smartphones
2018
Based on these results we designed and evaluated a system for encryption keys management that uses wearable devices as an additional source of entropy. ...
With almost two billion users worldwide, smartphones are used for almost everything – booking a hotel, ordering a cup of coffee, or paying in a shop. ...
Most of the participants stated that they do not use SMS for highly meaningful conversations, and rather use SMS messages for friendly chats and as a way to keep in touch with their friends. ...
doi:10.14288/1.0371128
fatcat:7jyo6keowzhrvekw7haz7hiu7e
Fiction on the Radio: Remediating Transnational Modernism
[article]
2020
The format of the radio address and the instant encounter with listeners shaped both the production and politics of Anglophone modernism to an extent hitherto unacknowledged in literary studies. ...
Contrary to the intentions of the BBC's directors, who hoped to export a monolithic English culture, empire broadcasting wreaked havoc on the imagined boundaries between center and periphery, revealing ...
Eliot discourages any approach but a systematic, chronological one and even that system leaves him feeling unprepared to explain how to read Joyce's last novel. ...
doi:10.34944/dspace/3292
fatcat:owaiahuo7zac5ko7kusxiuivkq
Getting to know you: a qualitative longitudinal study of the aspirations and career beginnings of a cohort of generation Y public health graduates, and implications for educators and employers
[article]
2019
Video and voice calls, instant messaging and file sharing with anyone else on Skype is free of charge. ...
It is crucial for both graduate and organisation to make a good start to their relationship, to live up to the message communicated in the recruitment process. ...
doi:10.26182/5d15be560c5b9
fatcat:wu3sj45gfjfrtlx6wg7hw5nhgy
Waking the White Goddess: a novel
unpublished
Johannesburg, in fulfilment of the requirements of the degree of Master of Arts by Research (Creative Writing) Johannesburg, 2010 i Introduction This dissertation presents a novel that charts the progress ...
It also explores and expounds on the theoretical underpinnings of the novel, such as white identity in post-apartheid South Africa, the use of Western mythologies in an African context, and a discussion ...
To register Rose"s disapproval, albeit subtly, I tried to depict the white community satirically: their dialogue is distilled from real conversations on which I have eavesdropped. ...
fatcat:ibchjn2cqfds7nffge7fuedroy
Towards a new transaesthetics: rap music in Germany and the United States
2021
To that end, I would like to offer my thanks in chronological order according to chapter.
Gracias ...
(In the video, a female nurse, modeled after nurse Ratched in One Flew Over the Cuckoo's Nest, issues the call over the PA system of a mock insane asylum.) ...
If that is the case, such music very likely induces a 'transculturating' effect that enables audiences to understand not only the robust contours of a given song, but the communities they physically and ...
doi:10.17877/de290r-22166
fatcat:b6e5dgdgsndoxntsw5nvevpy4q
« Previous
Showing results 1 — 15 out of 18 results