Sciweavers

503 search results - page 6 / 101
» Authenticity by tagging and typing
Sort
View
ERCIMDL
2010
Springer
100views Education» more  ERCIMDL 2010»
13 years 8 months ago
Exploring the Influence of Tagging Motivation on Tagging Behavior
The reasons why users tag have remained mostly elusive to quantitative investigations. In this paper, we distinguish between two types of motivation for tagging: While categorizers...
Roman Kern, Christian Körner, Markus Strohmai...
LFP
1992
140views more  LFP 1992»
13 years 8 months ago
Global Tagging Optimization by Type Inference
Tag handling accounts for a substantial amount of execution cost in latently typed languages such as Common LISP and Scheme, especially on architectures that provide no special ha...
Fritz Henglein
SEC
2007
13 years 9 months ago
Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols
In this paper, we analyze the security vulnerabilities of two ultra-lightweight RFID mutual authentication protocols: LMAP and M2 AP, which are recently proposed by Peris-Lopez et ...
Tieyan Li, Guilin Wang
CCS
2008
ACM
13 years 9 months ago
Robust, anonymous RFID authentication with constant key-lookup
A considerable number of anonymous RFID authentication schemes have been proposed. However, current proposals either do not provide robust security guarantees, or suffer from scal...
Mike Burmester, Breno de Medeiros, Rossana Motta
ICFP
1999
ACM
13 years 11 months ago
Type Dispatch for Named Hierarchical Types
Type dispatch constructs are an important feature of many programming languages. Scheme has predicates for testing the runtime type of a value. Java has a class cast expression an...
Neal Glew