Sciweavers

1116 search results - page 79 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
WACV
2008
IEEE
14 years 2 months ago
Toward Fully Automatic Geo-Location and Geo-Orientation of Static Outdoor Cameras
Automating tools for geo-locating and geo-orienting static cameras is a key step in creating a useful global imaging network from cameras attached to the Internet. We present algo...
Nathan Jacobs, Nathaniel Roman, Robert Pless
IACR
2011
221views more  IACR 2011»
12 years 7 months ago
A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions
Abstract. Radio Frequency Identification (RFID) systems are vulnerable to relay attacks (i.e., mafia, terrorist and distance frauds) when they are used for authentication purpose...
Süleyman Kardas, Mehmet Sabir Kiraz, Muhammed...
ENTCS
2006
154views more  ENTCS 2006»
13 years 8 months ago
Quantitative Static Analysis Over Semirings: Analysing Cache Behaviour for Java Card
We present a semantics-based technique for modeling and analysing resource usage behaviour of programs written in a simple object oriented language like Java e code. The approach ...
Pascal Sotin, David Cachera, Thomas P. Jensen
CEAS
2006
Springer
13 years 11 months ago
Sender Reputation in a Large Webmail Service
In this paper, we describe how a large webmail service uses reputation to classify authenticated sending domains as either spammy or not spammy. Both SPF and DomainKey authenticat...
Bradley Taylor
DCC
2004
IEEE
14 years 7 months ago
Fast Compression with a Static Model in High-Order Entropy
We report on a simple encoding format called wzip for decompressing block-sorting transforms, such as the Burrows-Wheeler Transform (BWT). Our compressor uses the simple notions o...
Luca Foschini, Roberto Grossi, Ankur Gupta, Jeffre...