Sciweavers

1026 search results - page 126 / 206
» A Methodology for Equational Reasoning
Sort
View
IAT
2008
IEEE
14 years 3 months ago
Auction Analysis by Normal Form Game Approximation
Auctions are pervasive in today’s society and provide a variety of real markets. This article facilitates a strategic choice between a set of available trading strategies by int...
Michael Kaisers, Karl Tuyls, Frank Thuijsman, Simo...
IH
2007
Springer
14 years 3 months ago
A Fusion of Maximum Likelihood and Structural Steganalysis
Abstract. This paper draws together two methodologies for the detection of bit replacement steganography: the principle of maximum likelihood, which is statistically well-founded b...
Andrew D. Ker
RE
2007
Springer
14 years 3 months ago
Secure and Dependable Patterns in Organizations: An Empirical Approach
Designing a secure and dependable system is not just a technical issue, it involves also a deep analysis of the organizational and the social environment in which the system will ...
Yudistira Asnar, Paolo Giorgini, Roberto Bonato, V...
AUTOID
2005
IEEE
14 years 2 months ago
Guidelines for Appropriate Use of Simulated Data for Bio-Authentication Research
In this paper, we outline a framework for appropriate and proper usage of simulated data for biometric authentication. Currently, there are no formal guidelines concerning the use...
Yan Ma, Michael E. Schuckers, Bojan Cukic
DATE
2005
IEEE
109views Hardware» more  DATE 2005»
14 years 2 months ago
Design Method for Constant Power Consumption of Differential Logic Circuits
Side channel attacks are a major security concern for smart cards and other embedded devices. They analyze the variations on the power consumption to find the secret key of the en...
Kris Tiri, Ingrid Verbauwhede