Sciweavers

1795 search results - page 167 / 359
» Security Models and Information Flow
Sort
View
FGR
1998
IEEE
203views Biometrics» more  FGR 1998»
15 years 8 months ago
Automated Facial Expression Recognition Based on FACS Action Units
Automated recognition of facial expression is an important addition to computer vision research because of its relevance to the study of psychological phenomena and the developmen...
James Jenn-Jier Lien, Takeo Kanade, Jeffrey F. Coh...
DSVIS
2003
Springer
15 years 9 months ago
Applying Extended Finite State Machines in Software Testing of Interactive Systems
Model Based Testing (MBT) is a functional testing technique that makes use of information from behavioral models of the software to carry out the testing task. This technique has b...
Marcelo Fantinato, Mario Jino
ISW
2007
Springer
15 years 10 months ago
Strongly-Secure Identity-Based Key Agreement and Anonymous Extension
Abstract. We study the provable security of identity-based (ID-based) key agreement protocols. Although several published protocols have been proven secure in the random oracle mod...
Sherman S. M. Chow, Kim-Kwang Raymond Choo
CCS
2001
ACM
15 years 8 months ago
Events in security protocols
The events of a security protocol and their causal dependency can play an important role in the analysis of security properties. This insight underlies both strand spaces and the ...
Federico Crazzolara, Glynn Winskel
CCS
2008
ACM
15 years 6 months ago
A security architecture for transient trust
In extraordinary situations, certain individuals may require access to information for which they are not normally authorized. For example, to facilitate rescue of people trapped ...
Cynthia E. Irvine, Timothy E. Levin, Paul C. Clark...