Sciweavers

4757 search results - page 55 / 952
» A Unique
Sort
View
ICISC
2007
102views Cryptology» more  ICISC 2007»
15 years 5 months ago
Passive Attacks on a Class of Authentication Protocols for RFID
Abstract. Mutual authentication mechanisms can be used in RFID systems to preserve the confidentiality of the RFID tags. Hiding the unique IDs of the tags is critical to prevent u...
Basel Alomair, Loukas Lazos, Radha Poovendran
106
Voted
IJCAI
2003
15 years 5 months ago
Challenges in Web Search Engines
This article presents a high-level discussion of some problems that are unique to web search engines. The goal is to raise awareness and stimulate research in these areas.
Monika Rauch Henzinger, Rajeev Motwani, Craig Silv...
CORR
2010
Springer
84views Education» more  CORR 2010»
15 years 3 months ago
Medians and means in Finsler geometry
We investigate existence and uniqueness of p-means ep and the median e1 of a probability measure
Marc Arnaudon, Frank Nielsen
JCT
2006
72views more  JCT 2006»
15 years 3 months ago
Partial flocks of the quadratic cone
: We prove that in PG(3, q), q > 19, a partial flock of a quadratic cone with q - planes, can be extended to a unique flock if < 1 4 q.
Péter Sziklai
PERCOM
2008
ACM
15 years 3 months ago
Randomized Bit Encoding for Stronger Backward Channel Protection in RFID Systems
In this paper, we introduce a randomized bit encoding scheme that can strengthen the privacy protection on RFID tags. This scheme is used together with the backward channel protec...
Tong-Lee Lim, Tieyan Li, Sze-Ling Yeo