Filters








1,327 Hits in 7.5 sec

Playing 'Hide and Seek' with Stored Keys [chapter]

Adi Shamir, Nicko van Someren
1999 Lecture Notes in Computer Science  
We describe efficient algebraic attacks which can locate secret RSA keys in long bit strings, and more general statistical attacks which can find arbitrary cryptographic keys embedded in large programs  ...  In this paper we consider the problem of efficiently locating cryptographic keys hidden in gigabytes of data, such as the complete file system of a typical PC.  ...  Conclusions The problem of efficient identification of stored secret keys in lunchtime attacks (as opposed to efficient computation of unknown secret keys by cryptanalysis) had received almost no attention  ... 
doi:10.1007/3-540-48390-x_9 fatcat:b5kf3zqcmrefnjumpgphxrnuua

Playing hide and seek with El Niño

M. J. McPhaden
2015 Nature Climate Change  
Natural variations most probably account for recent events, but climate change may also have played a role.  ...  Lower-frequency variability may have played a role as well, as the background state of the tropical Indo-Pacific has been changing on decadal timescales.  ...  The recurrence rate of extreme El Niños such as the 1997-1998 event is once every 15-20 years, leading some experts to interpret this similarity as evidence that we were in store for a big one.  ... 
doi:10.1038/nclimate2775 fatcat:4psr75k35vgrfdrn3pkgxnv5ai

Hide and Seek

Myrdene Anderson
2012 American Book Review  
I love providing support to the rest of the Army by boosting morale through the music we play.  ...  Ask your MEMBERSHIP IS THE KEY TO YOUR NEW HOME. APPLY TODAY!  ...  Local schools partner with the Space Foundation, which has a space-related education program for teachers.  ... 
doi:10.1353/abr.2012.0095 fatcat:4j5ozqo7drg6pgkfj5ytaepv74

Playing hide and seek with a mobile companion robot

Michael Volkhardt, Steffen Mueller, Christof Schroeter, Horst-Michael Gross
2011 2011 11th IEEE-RAS International Conference on Humanoid Robots  
The system has been tested by evaluating the robot's capability to find the user in a 3-room apartment in a hide and seek scenario.  ...  Evaluation of the approach has been done by playing games of hide and seek.  ...  For evaluation, we played several games of hide and seek a month after the aforementioned experiments without training new place models.  ... 
doi:10.1109/humanoids.2011.6100809 dblp:conf/humanoids/VolkhardtMSG11 fatcat:vu7lb3qgbzfszmydqivqigpawe

Stegomalware: Playing Hide and Seek with Malicious Components in Smartphone Apps [chapter]

Guillermo Suarez-Tangil, Juan E. Tapiador, Pedro Peris-Lopez
2015 Lecture Notes in Computer Science  
We demonstrate its feasibility with a prototype implementation of a stegomalware app that has remained undetected in Google Play so far.  ...  In contrast with existing obfuscation techniques, many existing information hiding algorithms are demonstrably secure, which would make such stegomalware virtually undetectable by static analysis techniques  ...  Contrarily to popular markets such as Google Play, in Aptoide there is not a centralized repository for apps, but each user manages their own "store."  ... 
doi:10.1007/978-3-319-16745-9_27 fatcat:abd6vgyuwjamhgvtwdlbmmtz4m

Learning in Hide-and-Seek

Qingsi Wang, Mingyan Liu
2016 IEEE/ACM Transactions on Networking  
In this paper, we take a different approach by assuming an intelligent pursuer/evader that is adaptive to the information available to it and is capable of learning over time with performance guarantee  ...  INTRODUCTION The pursuit-evasion (or hide-and-seek) problem arises in a variety of applications and has been extensively studied.  ...  System model Consider the repeated hide-and-seek interaction between a pursuer and an evader in discrete time.  ... 
doi:10.1109/tnet.2015.2412946 fatcat:5wjraqkaefcorebac63uzudveq

Learning in hide-and-seek

Qingsi Wang, Mingyan Liu
2014 IEEE INFOCOM 2014 - IEEE Conference on Computer Communications  
In this paper, we take a different approach by assuming an intelligent pursuer/evader that is adaptive to the information available to it and is capable of learning over time with performance guarantee  ...  INTRODUCTION The pursuit-evasion (or hide-and-seek) problem arises in a variety of applications and has been extensively studied.  ...  System model Consider the repeated hide-and-seek interaction between a pursuer and an evader in discrete time.  ... 
doi:10.1109/infocom.2014.6847942 dblp:conf/infocom/WangL14 fatcat:au3plj7y2rddhc3rihjeghlnw4

Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks

Roberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, Gene Tsudik
2009 Ad hoc networks  
Some sensor network settings involve disconnected or unattended operation with periodic visits by a mobile sink.  ...  As before, with KEEP-MOVING, all stored data items are sent to random sensors as well.  ...  Encrypted with a known key and super-encrypted with an unknown key: ðr 0 À rÞk n À ðr 0 À rÞk n : 3.  ... 
doi:10.1016/j.adhoc.2009.04.002 fatcat:rmnfzeks7rfmfm7wsa5ze544nq

Medical apps in endocrine diseases – hide and seek

Urs-Vito Albrecht, Ute von Jan
2014 Therapeutic Advances in Endocrinology and Metabolism  
These terms were then used to perform comprehensive searches in three categories of Apple's app store, namely 'Medicine', 'Health and Fitness', and 'Reference'.  ...  With a single exception, the identified apps had not undergone regulation, and information about the data sources, professional backgrounds, and reliability of the content and integrated information sources  ...  Also, it is still the one with the largest number of medical and health related apps [iMedicalApps, 2013] , closely followed by Google's Play Store; app stores for other platforms currently offer only  ... 
doi:10.1177/2042018814539375 pmid:25152809 pmcid:PMC4141527 fatcat:sycbcmyke5buhf6vrbslzxt7u4

Hide and Seek: A White Paper in Steganography

2013 Journal of the ACS Advances in Computer Science  
Providing and evaluating steganographic methods with experiments. In this article image files are discussed and how to hide information in them  ...  The purpose of the presented white paper is to provide momentary information in the area of Steganography with illustrations of some methods for Steganography.  ...  Acknowledgements: Some of the presented survey here were claried by discussion with Prof. Dr. Shilong Ma in Beijing University of Aeronautics and Astronautics (BUAA), China.  ... 
doi:10.21608/asc.2013.158158 fatcat:qciwsghsmfajzkz3kqaubhdspy

WINDOWS ROOTKITS A GAME OF "HIDE AND SEEK" [chapter]

Sherri Sparks, Shawn Embleton, Cliff C. Zou
2011 Handbook of Security and Networks  
As such, the Operating System, the intrusion detection system, and the kernel rootkit driver all operate upon an even playing field with equivalent access and system privileges.  ...  First generation techniques make direct modifications to program files stored on the hard disk.  ... 
doi:10.1142/9789814273046_0014 fatcat:hmsp6eymhbgahbnw4i5qj6mo6q

Human Immunodeficiency Virus Playing Hide-and-Seek: Understanding the TFH Cell Reservoir and Proposing Strategies to Overcome the Follicle Sanctuary

Yew Ann Leong, Anurag Atnerkar, Di Yu
2017 Frontiers in Immunology  
In addition to CTL exhaustion, viral CTL escape mutations also play a significant role in viral persistence (164) .  ...  FDCs, on the other hand, can store virus-immune complexes that facilitate the reinfection of TFH cells in B cell follicles.  ... 
doi:10.3389/fimmu.2017.00622 pmid:28620380 pmcid:PMC5449969 fatcat:khyeghctf5einpnbridpcpzqi4

Hide And Seek : Radial-Velocity Searches For Planets Around Active Stars

Raphaëlle Dawn Haywood, Andrew Collier Cameron
2015 Zenodo  
The density of CoRoT-7b is 6.61 ± 1.72 g.cm⁻³, which is compatible with a rocky composition.  ...  I found that the full-disc magnetic flux is an excellent proxy for activity-induced radial-velocity variations; this result may become key to breaking the activity barrier in coming years.  ...  The correlation between each pair of variables of the process plays a key role in determining the process. A Gaussian process Let's go back to Figure 2 .4, and use our imagination once more.  ... 
doi:10.5281/zenodo.35161 fatcat:elqbssdfyfd6ditqx4rb6cxl6y

Hide and seek: hidden genetic variance contributing to the adaptive potential of selfing populations [article]

Josselin Clo, Joelle Ronfort, Diala Abu Awad
2019 biorxiv/medrxiv   pre-print
The low heritable genetic variation observed in self-fertilising populations has led to the hypothesis that species with this particular mating system would be less likely to adapt.  ...  Using a classical quantitative genetics model, we demonstrate that selfing populations are better able to store cryptic genetic variance than outcrossing populations, notably due to their lower recombination  ...  The amount of heritable variance is thus expected to play a key 73 role in adaptation, and any forces affecting it may greatly influence whether or not 74 populations are able to survive environmental  ... 
doi:10.1101/810515 fatcat:53cha7z2w5b3njkgdmwwvz56um

Hide and Seek – Preserving Location Privacy and Utility in the Remote Identification of Unmanned Aerial Vehicles [article]

Alessandro Brighente, Mauro Conti, Savio Sciancalepore
2022 arXiv   pre-print
In particular, our experiments showed that when the location of an UAV is obfuscated with an average distance of 1.959 km, a carefully designed UAV detection system can detect 97.9% of invasions, with  ...  The UAVs have to trade-off such enhanced location privacy with a non-negligible probability of false positives, i.e., being detected as invading while not really invading the no-fly zone.  ...  From Sec. 4.1, recall that the generic UAV 𝑑 𝑛 stores the public key of the TTP, namely 𝑃 𝑇𝑇 𝑃 .  ... 
arXiv:2205.13808v1 fatcat:4fzoejevingend5enhq25nv4r4
« Previous Showing results 1 — 15 out of 1,327 results