We propose a new real-time authentication scheme for memory. As in previous proposals the scheme uses a Merkle tree to guarantee dynamic protection of memory. We use the universal...
The terms that are used by users during tagging have been found to be different from the terms that are used when searching for resources, which represents a fundamental problem f...
In this paper, we describe the design philosophy, implementation and evaluation of InkKit, an informal design platform that uses pen input on a tablet PC to imitate the informalit...
This paper addresses the topic of how architectural visual experience can be represented and utilised by a software system. The long-term aim is to equip an artificial agent with ...
Stephan K. Chalup, Riley Clement, Chris Tucker, Mi...
In RFID protocols, tags identify and authenticate themselves to readers. At Asiacrypt 2007, Vaudenay studied security and privacy models for these protocols. We extend this model ...