Sciweavers

3116 search results - page 109 / 624
» Recovering
Sort
View
IJACT
2008
136views more  IJACT 2008»
13 years 9 months ago
Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries
: In the absence of sufficiently optimised public key constructions, anonymous authentication for Radio-Frequency Identification Devices (RFIDs) requires state synchronisation betw...
Mike Burmester, Breno de Medeiros, Rossana Motta
INFSOF
2008
118views more  INFSOF 2008»
13 years 9 months ago
MARS: A metamodel recovery system using grammar inference
Domain-specific modeling (DSM) assists subject matter experts in describing the essential characteristics of a problem in their domain. Various software artifacts can be generated...
Faizan Javed, Marjan Mernik, Jeff Gray, Barrett R....
CORR
2007
Springer
133views Education» more  CORR 2007»
13 years 9 months ago
Blind Identification of Distributed Antenna Systems with Multiple Carrier Frequency Offsets
In spatially distributed multiuser antenna systems, the received signal contains multiple carrier-frequency offsets (CFOs) arising from mismatch between the oscillators of transmi...
Yuanning Yu, Athina P. Petropulu, H. Vincent Poor
INFORMATICALT
2006
177views more  INFORMATICALT 2006»
13 years 9 months ago
Cryptanalysis and Improvement of Practical Convertible Authenticated Encryption Schemes Using Self-Certified Public Keys
A convertible authenticated encryption scheme allows a specified recipient to recover and verify a message simultaneously. Moreover the recipient can prove the dishonesty of the se...
Zuhua Shao
CVIU
2007
149views more  CVIU 2007»
13 years 9 months ago
A volumetric fusion technique for surface reconstruction from silhouettes and range data
Optical triangulation, an active reconstruction technique, is known to be an accurate method but has several shortcomings due to occlusion and laser reflectance properties of the...
Yücel Yemez, C. J. Wetherilt