Abstract. We address the validation of the current sensed environmental state against a model known from earlier perception. Our surface based approach compares 3D range data of a ...
In this paper, we first show that many independent pseudorandom permutations over {0, 1}n can be obtained from a single public random permutation and secret n bits. We next prove ...
This paper proposes a self-authentication scheme for color images, using a fragile data hiding method based on the Discrete Pascal Transform (DPT). The main contribution of this wo...
In this paper, we propose a novel generative approach for face authentication, based on a Local Binary Pattern (LBP) description of the face. A generic face model is considered as ...
We present PEAR (Protocol Extendable AnalyzeR), a tool automating the two static analyses for authentication protocols presented in [7, 8]. These analyses are based on a tagging s...
Riccardo Focardi, Matteo Maffei, Francesco Placell...