Sciweavers

8644 search results - page 68 / 1729
» On the Composition of Secure Systems
Sort
View
CSFW
2008
IEEE
14 years 3 months ago
Composition of Password-Based Protocols
We investigate the composition of protocols that share a common secret. This situation arises when users employ the same password on different services. More precisely we study w...
Stéphanie Delaune, Steve Kremer, Mark Ryan
ICC
2009
IEEE
174views Communications» more  ICC 2009»
14 years 3 months ago
Biometric Mobile Template Protection: A Composite Feature Based Fingerprint Fuzzy Vault
—Biometric authentication is emerging as the promising solution to conventional cryptography based authentication technologies. However, protecting users’ biometric templates s...
Kai Xi, Jiankun Hu
ETRICS
2006
14 years 20 days ago
An Algebra for Enterprise Privacy Policies Closed Under Composition and Conjunction
To cope with the complex requirements imposed on the processing of privacy-sensitive data within enterprises, the use of automatic or semi-automatic tools is gradually becoming in...
Dominik Raub, Rainer Steinwandt
CVPR
2007
IEEE
14 years 11 months ago
Simultaneous Matting and Compositing
Recent work in matting, hole filling, and compositing allows image elements to be mixed in a new composite image. Previous algorithms for matting foreground elements have assumed ...
Jue Wang, Michael F. Cohen
ATVA
2006
Springer
206views Hardware» more  ATVA 2006»
14 years 22 days ago
Compositional Reasoning for Hardware/Software Co-verification
In this paper, we present and illustrate an approach to compositional reasoning for hardware/software co-verification of embedded systems. The major challenges in compositional rea...
Fei Xie, Guowu Yang, Xiaoyu Song