Filters








18 Hits in 10.3 sec

Honey chatting: A novel instant messaging system robust to eavesdropping over communication

Joo-Im Kim, Ji Won Yoon
2016 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)  
Else If ≠ , M* is become false message in (a) or plausible-looking fake message in (b).  Therefore, Eve(brute-force attacker) is hard to find the true message.  ...  If = , the receiver can obtain a true message M in both cases.  ...  ABSTRACT & INTRODUCTION Joo-Im Kim and Ji Won Yoon / Center for Information Security Technologies (CIST), Korea University HONEY CHATTING: A NOVEL INSTANT MESSAGING SYSTEM ROBUST TO EAVESDROPPING OVER  ... 
doi:10.1109/icassp.2016.7472064 dblp:conf/icassp/KimY16 fatcat:vsusevrkkzdl7bpzy7xsmqmedu

The Analysis of Cipher Padding Problem for Message Recovery Security Function of Honey Encryption
허니암호의 메시지 복구보안 기능을 위한 암호패딩 문제점 분석

Changhwan Ji, Jiwon Yoon
2017 Journal of KIISE  
Honey Encryption (HE) is a technique to overcome the weakness of a brute-force attack of the existing password-based encryption (PBE).  ...  By outputting a plausible plaintext even if the wrong key is entered, it provides message recovery security which an attacker can tolerate even if the attacker tries a brute-force attack against a small  ...  Yoon, "Honey chatting: A novel instant messaging system robust to eavesdropping over communication 지 창 환 2005년 공주대학교 정보통신공학부 컴퓨 터전공 학사 2016년~현재 고려대학교 정보보호대학원 정보보학과 석사과정.  ... 
doi:10.5626/jok.2017.44.6.637 fatcat:5kv2zizmdjehvge6hddlp45p5q

The Information in Emotion Communication [article]

Alison Duncan Kerr, Kevin Scharp
2020 arXiv   pre-print
How much information is transmitted when animals use emotions to communicate? It is clear that emotions are used as communication systems in humans and other species.  ...  One important application of the information theory of emotion communication is that it permits the development of emotion security systems for social networks to guard against the widespread emotion manipulation  ...  Thank you to our families for their unwavering support. And, to each other.  ... 
arXiv:2002.08470v1 fatcat:57wauv3s7nfcdb52bamge3jbsm

Analysis of Data-At-Rest Security In Smartphones

Ildar Muslukhov
2018 Zenodo  
Based on these results we designed and evaluated a system for encryption keys management that uses wearable devices as an additional source of entropy.  ...  With almost two billion users worldwide, smartphones are used for almost everything – booking a hotel, ordering a cup of coffee, or paying in a shop.  ...  Most of the participants stated that they do not use SMS for highly meaningful conversations, and rather use SMS messages for friendly chats and as a way to keep in touch with their friends.  ... 
doi:10.5281/zenodo.3264745 fatcat:cbrrlqwup5fubjlr4ehnikdixq

A Review of Insider Threat Detection Approaches with IoT Perspective

Aram Kim, Junhyoung Oh, Jinho Ryu, Kyungho Lee
2020 IEEE Access  
Attack surfaces are significantly enlarged which could cause a severe risk in terms of company insider threat management.  ...  Security professionals, government agencies, and corporate organizations have found an inherent need to prevent or mitigate attacks from insider threats.  ...  To analyze text, the authors choose features from the names (character, guild, role, race, actions) and chat messages.  ... 
doi:10.1109/access.2020.2990195 fatcat:uxydn6lk4vdi5mtqaotp35s3oq

A Primer of Mathematical Writing, Second Edition [article]

Steven G. Krantz
2016 arXiv   pre-print
This is a tract on the art and practice of mathematical writing.  ...  Generally speaking, the ability to converse with multiple people in the same conversation differentiates chat rooms from instant messaging programs, which are more typically designed for one-to-one communication  ...  Blogs and chat rooms and wikis and related utilities have expanded our ability to communicate with people all over the world.  ... 
arXiv:1612.04888v1 fatcat:lkxvvroozfdqfkivb7kmh62qte

1. Something for Nothing [chapter]

Timothy Langen
2021 Reading Backwards  
We are grateful to Adam Horsley (University of Exeter) for timely traduction, and to Jacob Emery (Indiana University) for an inspiring critique of our volume which was simultaneously astute and empathetic  ...  We are grateful to our families and colleagues for their forbearance and good humour.  ...  comes upon a strange, nameless man who bears witness to the moral horrors of the prison system that had been glossed over by the evangelizing Englishman.  ... 
doi:10.11647/obp.0241.01 fatcat:iydsaxnuqrf7rpal2yuyhhmxnu

Mud map: Australian women's experimental writing

MTC Cronin, Jill Martindale Farrar, joanne burns, Jo Gardiner, Loma Bridge, Carolyn van Langenberg, Jenna Sten, Pam Brown, Sal Brereton, Sarah Holland-Batt, Nour Dados, Tiffany Hambley (+21 others)
2013 Text: Journal of the Australian Association of Writing Programs  
Similarly, persuasive definition ~ there have been few who have needed to be persuaded however it does seem true that over time persuasion becomes more and more necessary.  ...  ~ apparently love needs to be pointed to.  ...  The power lines jangled all day with their messages skittering in and out of the house. Like a message that got lost a giant dog leaned over the fence to stoop down and sniff the top of my head.  ... 
doi:10.52086/001c.28893 fatcat:hnauom2cvzej3ocogwmys7rs3a

Craft and control : Networks, strategies and ordering in New Zealand beekeeping [article]

Bronwyn M. Newton, University Of Canterbury
2012
These regional developments are facilitated by the emergence of information and communication technologies (ICTs) in beekeeping.  ...  The new technologies are presently effecting novel forms of interaction among certain participants sharing particular sets of skills.  ...  ' Distribution Ust.. .. 1 feel a little uneasy about the ease at which I can 'eavesdrop' on such communications -the boundary between public and private is blurred.  ... 
doi:10.26021/4181 fatcat:jf7ihefyrbdv3kszotn6q5z5ky

Sharia in the city: negotiation and construction of moral space

Sharif Islam
2016 Zenodo  
Even though I focus on a particular neighborhood in Chicago, my aim is to flesh out the various historical, local, and global links that form a broader, nuanced picture of sharia in the United States.  ...  To this end, my analysis also takes in the broader history of Islam in the United States in order to contextualize the place and voice of the people that I present here.  ...  this slice will taste, whether or not it will be 100% halal or not but it will be a challenging and fascinating moral trajectory.  ... 
doi:10.5281/zenodo.5912999 fatcat:74nqs6cc4jdjjnzockfbpcecpq

Analysis of data-at-rest security In smartphones

Ildar Muslukhov
2018
Based on these results we designed and evaluated a system for encryption keys management that uses wearable devices as an additional source of entropy.  ...  With almost two billion users worldwide, smartphones are used for almost everything – booking a hotel, ordering a cup of coffee, or paying in a shop.  ...  Most of the participants stated that they do not use SMS for highly meaningful conversations, and rather use SMS messages for friendly chats and as a way to keep in touch with their friends.  ... 
doi:10.14288/1.0371128 fatcat:7jyo6keowzhrvekw7haz7hiu7e

Fiction on the Radio: Remediating Transnational Modernism [article]

(:Unkn) Unknown, University, My, Priya Joshi
2020
The format of the radio address and the instant encounter with listeners shaped both the production and politics of Anglophone modernism to an extent hitherto unacknowledged in literary studies.  ...  Contrary to the intentions of the BBC's directors, who hoped to export a monolithic English culture, empire broadcasting wreaked havoc on the imagined boundaries between center and periphery, revealing  ...  Eliot discourages any approach but a systematic, chronological one and even that system leaves him feeling unprepared to explain how to read Joyce's last novel.  ... 
doi:10.34944/dspace/3292 fatcat:owaiahuo7zac5ko7kusxiuivkq

Getting to know you: a qualitative longitudinal study of the aspirations and career beginnings of a cohort of generation Y public health graduates, and implications for educators and employers [article]

Denise Sullivan
2019
Video and voice calls, instant messaging and file sharing with anyone else on Skype is free of charge.  ...  It is crucial for both graduate and organisation to make a good start to their relationship, to live up to the message communicated in the recruitment process.  ... 
doi:10.26182/5d15be560c5b9 fatcat:wu3sj45gfjfrtlx6wg7hw5nhgy

Waking the White Goddess: a novel

Jill Nudelman, To Sam, Leigh Nudelman, Di Michelow-Valle, Ignacio Valle, Debbie, David Lubinsky, Andy Kollenberg, David Medalie, Maren Bodenstein, Emma Chen, Jean (+6 others)
unpublished
Johannesburg, in fulfilment of the requirements of the degree of Master of Arts by Research (Creative Writing) Johannesburg, 2010 i Introduction This dissertation presents a novel that charts the progress  ...  It also explores and expounds on the theoretical underpinnings of the novel, such as white identity in post-apartheid South Africa, the use of Western mythologies in an African context, and a discussion  ...  To register Rose"s disapproval, albeit subtly, I tried to depict the white community satirically: their dialogue is distilled from real conversations on which I have eavesdropped.  ... 
fatcat:ibchjn2cqfds7nffge7fuedroy

Towards a new transaesthetics: rap music in Germany and the United States

Terence David Kumpf, Technische Universität Dortmund
2021
To that end, I would like to offer my thanks in chronological order according to chapter. Gracias  ...  (In the video, a female nurse, modeled after nurse Ratched in One Flew Over the Cuckoo's Nest, issues the call over the PA system of a mock insane asylum.)  ...  If that is the case, such music very likely induces a 'transculturating' effect that enables audiences to understand not only the robust contours of a given song, but the communities they physically and  ... 
doi:10.17877/de290r-22166 fatcat:b6e5dgdgsndoxntsw5nvevpy4q
« Previous Showing results 1 — 15 out of 18 results