Sciweavers

2702 search results - page 321 / 541
» Message from the Editor
Sort
View
JCM
2008
138views more  JCM 2008»
15 years 4 months ago
Cryptanalysis of Some RFID Authentication Protocols
Two effective attacks, namely de-synchronization attack and impersonation attack, against Ha et al. 's LCSS RFID authentication protocol, Song and Mitchell's protocol are...
Tianjie Cao, Peng Shen, Elisa Bertino
JDCTA
2008
535views more  JDCTA 2008»
15 years 4 months ago
Steganography: DCT Coefficients Reparation Technique in JPEG Image
Due to the ever-growing usage of the computer, it has led to a rapid increment in the data that is being exchanged, published and stored in an assortment of digital form. This phe...
Chiew Kang Leng, Jane Labadin, Sarah Flora Samson ...
IPL
2006
88views more  IPL 2006»
15 years 4 months ago
A note on the attractor-property of infinite-state Markov chains
In the past 5 years, a series of verification algorithms has been proposed for infinite Markov chains that have a finite attractor, i.e., a set that will be visited infinitely oft...
Christel Baier, Nathalie Bertrand, Ph. Schnoebelen
CSI
2007
83views more  CSI 2007»
15 years 4 months ago
A model-driven choreography conceptual framework
A number of languages exist that try to model the external visible behavior of services. However, they constitute incomplete solutions, either because, they do not include proper ...
Sinuhé Arroyo, Alistair Duke, José M...
JNW
2008
101views more  JNW 2008»
15 years 4 months ago
Micro-controller based Remote Monitoring using Mobile through Spoken Commands
Mobile phone can serve as powerful tool for world-wide communication. A system is developed to remotely monitor process through spoken commands using mobile. Mel cepstrum features ...
Naresh P. Jawarkar, Vasif Ahmed, Siddharth A. Ladh...