Sciweavers

1970 search results - page 268 / 394
» Security Without Firewalls
Sort
View
ICAPR
2005
Springer
15 years 9 months ago
Millimetre-Wave Personnel Scanners for Automated Weapon Detection
The ATRIUM project aims to the automatic detection of threats hidden under clothes using millimetre-wave imaging. We describe a simulator of realistic millimetre-wave images and a...
Beatriz Grafulla-González, Christopher D. H...
IFIP
2004
Springer
15 years 9 months ago
An Interactive Trust Management and Negotiation Scheme
Interactive access control allows a server to compute and communicate on the fly the missing credentials to a client and to adapt its responses on the basis of presented and decli...
Hristo Koshutanski, Fabio Massacci
IFIP
2004
Springer
15 years 9 months ago
Decidability of Opacity with Non-Atomic Keys
The most studied property, secrecy, is not always sufficient to prove the security of a protocol. Other properties such as anonymity, privacy or opacity could be useful. Here, we u...
Laurent Mazaré
DEXAW
2003
IEEE
122views Database» more  DEXAW 2003»
15 years 9 months ago
Fairness in Wallets with Observer
We examine the interference of fairness and observers in digital coin systems. Since copying of coins cannot be prevented cryptographically in anonymous off-line coin systems, dou...
Heike Neumann, Thomas Schwarzpaul
ICRA
2003
IEEE
116views Robotics» more  ICRA 2003»
15 years 9 months ago
On the force capability of underactuated fingers
This paper studies the force capability of a particular class of underactuated fingers. Force capability is defined as the ability to create an external wrench onto a fixed obj...
Lionel Birglen, Clément Gosselin