Sciweavers

1448 search results - page 126 / 290
» From Requirements to Code Revisited
Sort
View
AVBPA
2005
Springer
275views Biometrics» more  AVBPA 2005»
15 years 9 months ago
Vulnerabilities in Biometric Encryption Systems
Abstract. The goal of a biometric encryption system is to embed a secret into a biometric template in a way that can only be decrypted with a biometric image from the enroled perso...
Andy Adler
CCS
2004
ACM
15 years 9 months ago
Reusable cryptographic fuzzy extractors
We show that a number of recent definitions and constructions of fuzzy extractors are not adequate for multiple uses of the same fuzzy secret—a major shortcoming in the case of...
Xavier Boyen
COMPSAC
2003
IEEE
15 years 9 months ago
Automating Checking of Models Built Using a Graphically Based Formal Modelling Language
RDT is a graphical formal modelling language in which the modeller works by constructing diagrams of the processes in their model which they then join together to form complete sy...
Robert John Walters
115
Voted
IEEEMSP
2002
IEEE
115views Multimedia» more  IEEEMSP 2002»
15 years 9 months ago
Aerial communications using piano, clarinet, and bells
— This work explores novel mechanisms for aerial acoustic machine-machine communications. It builds on previous work by some of the authors [1], as well as others [2]. In this pa...
Natacha Domingues, Joáo Lacerda, Pedro M. Q...
DEON
2010
Springer
15 years 8 months ago
Relevance, Derogation and Permission
Abstract. We show that a recently developed theory of positive permission based on the notion of derogation is hampered by a triviality result that indicates a problem with the und...
Audun Stolpe