Sciweavers

33 search results - page 4 / 7
» Attacking Unlinkability: The Importance of Context
Sort
View
ESORICS
2012
Springer
11 years 9 months ago
Secure Proximity Detection for NFC Devices Based on Ambient Sensor Data
In certain applications, it is important for a remote server to securely determine whether or not two mobile devices are in close physical proximity. In particular, in the context ...
Tzipora Halevi, Di Ma, Nitesh Saxena, Tuo Xiang
VLDB
2009
ACM
182views Database» more  VLDB 2009»
14 years 7 months ago
Guessing the extreme values in a data set: a Bayesian method and its applications
For a largenumber of data management problems, it would be very useful to be able to obtain a few samples from a data set, and to use the samples to guess the largest (or smallest)...
Mingxi Wu, Chris Jermaine
AAAI
2007
13 years 9 months ago
Data Structures for Generalised Arc Consistency for Extensional Constraints
Extensional (table) constraints are an important tool for attacking combinatorial problems with constraint programming. Recently there has been renewed interest in fast propagatio...
Ian P. Gent, Christopher Jefferson, Ian Miguel, Pe...
ICALP
2005
Springer
14 years 15 days ago
Password-Based Encryption Analyzed
Abstract. The use of passwords in security protocols is particularly delicate because of the possibility of off-line guessing attacks. We study password-based protocols in the cont...
Martín Abadi, Bogdan Warinschi
ICRA
1999
IEEE
142views Robotics» more  ICRA 1999»
13 years 11 months ago
Development of BEST Nano-robot Soccer Team
In this paper, we describe the development of our BEST nano-robot soccer team composed of 5 robots, a vision system, and communication modules. Each nano-robot is designed with an...
Sung Ho Kim, JongSuk Choi, Byung Kook Kim