Sciweavers

1116 search results - page 140 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
CCS
2004
ACM
14 years 1 months ago
Privacy and security in library RFID: issues, practices, and architectures
We expose privacy issues related to Radio Frequency Identification (RFID) in libraries, describe current deployments, and suggest novel architectures for library RFID. Libraries ...
David Molnar, David Wagner
CSFW
2002
IEEE
14 years 24 days ago
Types and Effects for Asymmetric Cryptographic Protocols
We present the first type and effect system for proving authenticity properties of security protocols based on asymmetric cryptography. The most significant new features of our ...
Andrew D. Gordon, Alan Jeffrey
PR
2010
151views more  PR 2010»
13 years 6 months ago
Coupled region-edge shape priors for simultaneous localization and figure-ground segmentation
We propose a new algorithm for simultaneous localization and figure-ground segmentation where coupled region-edge shape priors are involved with two different but complementary ...
Cheng Chen, Guoliang Fan
SIAMAM
2008
94views more  SIAMAM 2008»
13 years 7 months ago
Diffusion of Protein Receptors on a Cylindrical Dendritic Membrane with Partially Absorbing Traps
Abstract. We present a model of protein receptor trafficking within the membrane of a cylindrical dendrite containing small protrusions called spines. Spines are the locus of most ...
Paul C. Bressloff, Berton A. Earnshaw, Michael J. ...
TSD
2010
Springer
13 years 5 months ago
Listening-Test-Based Annotation of Communicative Functions for Expressive Speech Synthesis
This paper is focused on the evaluation of listening test that was realized with a view to objectively annotate expressive speech recordings and further develop a limited domain ex...
Martin Gruber, Jindrich Matousek