Sciweavers

503 search results - page 78 / 101
» Authenticity by tagging and typing
Sort
View
SOUPS
2009
ACM
14 years 2 months ago
Usability and security of out-of-band channels in secure device pairing protocols
Initiating and bootstrapping secure, yet low-cost, ad-hoc transactions is an important challenge that needs to be overcome if the promise of mobile and pervasive computing is to b...
Ronald Kainda, Ivan Flechais, A. W. Roscoe
ESORICS
2005
Springer
14 years 1 months ago
Browser Model for Security Analysis of Browser-Based Protocols
Currently, many industrial initiatives focus on web-based applications. In this context an important requirement is that the user should only rely on a standard web browser. Hence...
Thomas Groß, Birgit Pfitzmann, Ahmad-Reza Sa...
ICMCS
2010
IEEE
149views Multimedia» more  ICMCS 2010»
13 years 7 months ago
Single-view recaptured image detection based on physics-based features
In daily life, we can see images of real-life objects on posters, television, or virtually any type of smooth physical surfaces. We seldom confuse these images with the objects pe...
Xinting Gao, Tian-Tsong Ng, Bo Qiu, Shih-Fu Chang
SIGMOD
2003
ACM
1527views Database» more  SIGMOD 2003»
14 years 7 months ago
XPRESS: A Queriable Compression for XML Data
Like HTML, many XML documents are resident on native file systems. Since XML data is irregular and verbose, the disk space and the network bandwidth are wasted. To overcome the ve...
Jun-Ki Min, Myung-Jae Park, Chin-Wan Chung
SEMWEB
2009
Springer
14 years 2 months ago
Results of OKKAM Feature based Entity Matching Algorithm for Instance Matching Contest of OAEI 2009
To investigate the problem of entity recognition, we deal with the creation of the so-called Entity Name System (ENS) which is an open, public back-bone infrastructure for the (Sem...
Heiko Stoermer, Nataliya Rassadko