Sciweavers

314 search results - page 30 / 63
» Cubical token systems
Sort
View
COMPSEC
2008
99views more  COMPSEC 2008»
13 years 8 months ago
SSL/TLS session-aware user authentication revisited
Man-in-the-middle (MITM) attacks pose a serious threat to SSL/TLS-based e-commerce applications, and there are only a few technologies available to mitigate the risks. In [OHB05], ...
Rolf Oppliger, Ralf Hauser, David A. Basin
SASO
2007
IEEE
14 years 2 months ago
Robot Search in 3D Swarm Construction
Robots in a swarm construction system need to be able to find their way to all potential places to add material to a structure. In two dimensions, a (trivial) procedure exists fo...
Justin Werfel
DIM
2007
ACM
14 years 17 days ago
Implementing identity provider on mobile phone
We have implemented an identity provider (IdP), which is defined by the Liberty Alliance on a mobile phone. We propose an authentication method, which uses this personal IdP as a ...
Tsuyoshi Abe, Hiroki Itoh, Kenji Takahashi
IEEEVAST
2010
13 years 3 months ago
A visual analytics approach to model learning
The process of learning models from raw data typically requires a substantial amount of user input during the model initialization phase. We present an assistive visualization sys...
Supriya Garg, I. V. Ramakrishnan, Klaus Mueller
IJBC
2008
98views more  IJBC 2008»
13 years 8 months ago
Slow Invariant Manifolds as Curvature of the Flow of Dynamical Systems
Considering trajectory curves, integral of n-dimensional dynamical systems, within the framework of Differential Geometry as curves in Euclidean n-space it will be established in ...
Jean-Marc Ginoux, Bruno Rossetto, Leon O. Chua