Sciweavers

849 search results - page 123 / 170
» Completely Non-malleable Schemes
Sort
View
ACSAC
2009
IEEE
14 years 3 months ago
On the Security of PAS (Predicate-Based Authentication Service)
—Recently a new human authentication scheme called PAS (predicate-based authentication service) was proposed, which does not require the assistance of any supplementary device. T...
Shujun Li, Hassan Jameel Asghar, Josef Pieprzyk, A...
EUROSEC
2009
ACM
14 years 3 months ago
Deep packet anonymization
Network traces of Internet attacks are among the most valuable resources for network analysts and security researchers. However, organizations and researchers are usually reluctan...
Michalis Foukarakis, Demetres Antoniades, Michalis...
CODES
2009
IEEE
14 years 3 months ago
FlexRay schedule optimization of the static segment
The FlexRay bus is the prospective automotive standard communication system. For the sake of a high flexibility, the protocol includes a static time-triggered and a dynamic event...
Martin Lukasiewycz, Michael Glaß, Jürge...
CRV
2009
IEEE
132views Robotics» more  CRV 2009»
14 years 3 months ago
A Vision-Based Control and Interaction Framework for a Legged Underwater Robot
We present a vision-based control and interaction framework for mobile robots, and describe its implementation in a legged amphibious robot. The control scheme enables the robot t...
Junaed Sattar, Gregory Dudek
ICDAR
2009
IEEE
14 years 3 months ago
Unsupervised Selection and Discriminative Estimation of Orthogonal Gaussian Mixture Models for Handwritten Digit Recognition
The problem of determining the appropriate number of components is important in finite mixture modeling for pattern classification. This paper considers the application of an unsu...
Xuefeng Chen, Xiabi Liu, Yunde Jia