Sciweavers

804 search results - page 40 / 161
» How to Break Access Control in a Controlled Manner
Sort
View
ICIAR
2010
Springer
15 years 9 months ago
Two-Factor Authentication or How to Potentially Counterfeit Experimental Results in Biometric Systems
Two-factor authentication has been introduced in order to enhance security in authentication systems. Different factors have been introduced, which are combined for means of contr...
Christian Rathgeb, Andreas Uhl
FSE
2008
Springer
110views Cryptology» more  FSE 2008»
15 years 6 months ago
How to Encrypt with a Malicious Random Number Generator
Chosen-plaintext attacks on private-key encryption schemes are currently modeled by giving an adversary access to an oracle that encrypts a given message m using random coins that ...
Seny Kamara, Jonathan Katz
ICDE
2006
IEEE
131views Database» more  ICDE 2006»
16 years 5 months ago
On the Controlled Evolution of Process Choreographies
Process?aware information systems have to be frequently adapted due to business process changes. One important challenge not adequately addressed so far concerns the evolution of ...
Stefanie Rinderle, Andreas Wombacher, Manfred Reic...
ESANN
2001
15 years 5 months ago
Motor control and movement optimization learned by combining auto-imitative and genetic algorithms
In sensorimotor behaviour often a great movement execution variability is combined with a relatively low error in reaching the intended goal. This phenomenon can especially be obse...
Karl-Theodor Kalveram, Ulrich Nakte
UAIS
2010
14 years 11 months ago
Auditory universal accessibility of data tables using naturally derived prosody specification
Abstract Text documents usually embody visually oriented meta-information in the form of complex visual structures, such as tables. The semantics involved in such objects result in...
Dimitris Spiliotopoulos, Gerasimos Xydas, Georgios...