A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2005; you can also visit the original URL.
The file type is application/pdf
.
Filters
Playing 'Hide and Seek' with Stored Keys
[chapter]
1999
Lecture Notes in Computer Science
We describe efficient algebraic attacks which can locate secret RSA keys in long bit strings, and more general statistical attacks which can find arbitrary cryptographic keys embedded in large programs ...
In this paper we consider the problem of efficiently locating cryptographic keys hidden in gigabytes of data, such as the complete file system of a typical PC. ...
Conclusions The problem of efficient identification of stored secret keys in lunchtime attacks (as opposed to efficient computation of unknown secret keys by cryptanalysis) had received almost no attention ...
doi:10.1007/3-540-48390-x_9
fatcat:b5kf3zqcmrefnjumpgphxrnuua
Playing hide and seek with El Niño
2015
Nature Climate Change
Natural variations most probably account for recent events, but climate change may also have played a role. ...
Lower-frequency variability may have played a role as well, as the background state of the tropical Indo-Pacific has been changing on decadal timescales. ...
The recurrence rate of extreme El Niños such as the 1997-1998 event is once every 15-20 years, leading some experts to interpret this similarity as evidence that we were in store for a big one. ...
doi:10.1038/nclimate2775
fatcat:4psr75k35vgrfdrn3pkgxnv5ai
Hide and Seek
2012
American Book Review
I love providing support to the rest of the Army by boosting morale through the music we play. ...
Ask your MEMBERSHIP IS THE KEY TO YOUR NEW HOME. APPLY TODAY! ...
Local schools partner with the Space Foundation, which has a space-related education program for teachers. ...
doi:10.1353/abr.2012.0095
fatcat:4j5ozqo7drg6pgkfj5ytaepv74
Playing hide and seek with a mobile companion robot
2011
2011 11th IEEE-RAS International Conference on Humanoid Robots
The system has been tested by evaluating the robot's capability to find the user in a 3-room apartment in a hide and seek scenario. ...
Evaluation of the approach has been done by playing games of hide and seek. ...
For evaluation, we played several games of hide and seek a month after the aforementioned experiments without training new place models. ...
doi:10.1109/humanoids.2011.6100809
dblp:conf/humanoids/VolkhardtMSG11
fatcat:vu7lb3qgbzfszmydqivqigpawe
Stegomalware: Playing Hide and Seek with Malicious Components in Smartphone Apps
[chapter]
2015
Lecture Notes in Computer Science
We demonstrate its feasibility with a prototype implementation of a stegomalware app that has remained undetected in Google Play so far. ...
In contrast with existing obfuscation techniques, many existing information hiding algorithms are demonstrably secure, which would make such stegomalware virtually undetectable by static analysis techniques ...
Contrarily to popular markets such as Google Play, in Aptoide there is not a centralized repository for apps, but each user manages their own "store." ...
doi:10.1007/978-3-319-16745-9_27
fatcat:abd6vgyuwjamhgvtwdlbmmtz4m
Learning in Hide-and-Seek
2016
IEEE/ACM Transactions on Networking
In this paper, we take a different approach by assuming an intelligent pursuer/evader that is adaptive to the information available to it and is capable of learning over time with performance guarantee ...
INTRODUCTION The pursuit-evasion (or hide-and-seek) problem arises in a variety of applications and has been extensively studied. ...
System model Consider the repeated hide-and-seek interaction between a pursuer and an evader in discrete time. ...
doi:10.1109/tnet.2015.2412946
fatcat:5wjraqkaefcorebac63uzudveq
Learning in hide-and-seek
2014
IEEE INFOCOM 2014 - IEEE Conference on Computer Communications
In this paper, we take a different approach by assuming an intelligent pursuer/evader that is adaptive to the information available to it and is capable of learning over time with performance guarantee ...
INTRODUCTION The pursuit-evasion (or hide-and-seek) problem arises in a variety of applications and has been extensively studied. ...
System model Consider the repeated hide-and-seek interaction between a pursuer and an evader in discrete time. ...
doi:10.1109/infocom.2014.6847942
dblp:conf/infocom/WangL14
fatcat:au3plj7y2rddhc3rihjeghlnw4
Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks
2009
Ad hoc networks
Some sensor network settings involve disconnected or unattended operation with periodic visits by a mobile sink. ...
As before, with KEEP-MOVING, all stored data items are sent to random sensors as well. ...
Encrypted with a known key and super-encrypted with an unknown key: ðr 0 À rÞk n À ðr 0 À rÞk n : 3. ...
doi:10.1016/j.adhoc.2009.04.002
fatcat:rmnfzeks7rfmfm7wsa5ze544nq
Medical apps in endocrine diseases – hide and seek
2014
Therapeutic Advances in Endocrinology and Metabolism
These terms were then used to perform comprehensive searches in three categories of Apple's app store, namely 'Medicine', 'Health and Fitness', and 'Reference'. ...
With a single exception, the identified apps had not undergone regulation, and information about the data sources, professional backgrounds, and reliability of the content and integrated information sources ...
Also, it is still the one with the largest number of medical and health related apps [iMedicalApps, 2013] , closely followed by Google's Play Store; app stores for other platforms currently offer only ...
doi:10.1177/2042018814539375
pmid:25152809
pmcid:PMC4141527
fatcat:sycbcmyke5buhf6vrbslzxt7u4
Hide and Seek: A White Paper in Steganography
2013
Journal of the ACS Advances in Computer Science
Providing and evaluating steganographic methods with experiments. In this article image files are discussed and how to hide information in them ...
The purpose of the presented white paper is to provide momentary information in the area of Steganography with illustrations of some methods for Steganography. ...
Acknowledgements: Some of the presented survey here were claried by discussion with Prof. Dr. Shilong Ma in Beijing University of Aeronautics and Astronautics (BUAA), China. ...
doi:10.21608/asc.2013.158158
fatcat:qciwsghsmfajzkz3kqaubhdspy
WINDOWS ROOTKITS A GAME OF "HIDE AND SEEK"
[chapter]
2011
Handbook of Security and Networks
As such, the Operating System, the intrusion detection system, and the kernel rootkit driver all operate upon an even playing field with equivalent access and system privileges. ...
First generation techniques make direct modifications to program files stored on the hard disk. ...
doi:10.1142/9789814273046_0014
fatcat:hmsp6eymhbgahbnw4i5qj6mo6q
Human Immunodeficiency Virus Playing Hide-and-Seek: Understanding the TFH Cell Reservoir and Proposing Strategies to Overcome the Follicle Sanctuary
2017
Frontiers in Immunology
In addition to CTL exhaustion, viral CTL escape mutations also play a significant role in viral persistence (164) . ...
FDCs, on the other hand, can store virus-immune complexes that facilitate the reinfection of TFH cells in B cell follicles. ...
doi:10.3389/fimmu.2017.00622
pmid:28620380
pmcid:PMC5449969
fatcat:khyeghctf5einpnbridpcpzqi4
Hide And Seek : Radial-Velocity Searches For Planets Around Active Stars
2015
Zenodo
The density of CoRoT-7b is 6.61 ± 1.72 g.cm⁻³, which is compatible with a rocky composition. ...
I found that the full-disc magnetic flux is an excellent proxy for activity-induced radial-velocity variations; this result may become key to breaking the activity barrier in coming years. ...
The correlation between each pair of variables of the process plays a key role in determining the process.
A Gaussian process Let's go back to Figure 2 .4, and use our imagination once more. ...
doi:10.5281/zenodo.35161
fatcat:elqbssdfyfd6ditqx4rb6cxl6y
Hide and seek: hidden genetic variance contributing to the adaptive potential of selfing populations
[article]
2019
biorxiv/medrxiv
pre-print
The low heritable genetic variation observed in self-fertilising populations has led to the hypothesis that species with this particular mating system would be less likely to adapt. ...
Using a classical quantitative genetics model, we demonstrate that selfing populations are better able to store cryptic genetic variance than outcrossing populations, notably due to their lower recombination ...
The amount of heritable variance is thus expected to play a key 73 role in adaptation, and any forces affecting it may greatly influence whether or not 74 populations are able to survive environmental ...
doi:10.1101/810515
fatcat:53cha7z2w5b3njkgdmwwvz56um
Hide and Seek – Preserving Location Privacy and Utility in the Remote Identification of Unmanned Aerial Vehicles
[article]
2022
arXiv
pre-print
In particular, our experiments showed that when the location of an UAV is obfuscated with an average distance of 1.959 km, a carefully designed UAV detection system can detect 97.9% of invasions, with ...
The UAVs have to trade-off such enhanced location privacy with a non-negligible probability of false positives, i.e., being detected as invading while not really invading the no-fly zone. ...
From Sec. 4.1, recall that the generic UAV 𝑑 𝑛 stores the public key of the TTP, namely 𝑃 𝑇𝑇 𝑃 . ...
arXiv:2205.13808v1
fatcat:4fzoejevingend5enhq25nv4r4
« Previous
Showing results 1 — 15 out of 1,327 results