Sciweavers

631 search results - page 13 / 127
» Strong Authentication and Strong Integrity (SASI) Is Not Tha...
Sort
View
ACSAC
1999
IEEE
13 years 12 months ago
Efficient Certificate Status Handling Within PKIs: An Application to Public Administration Services
Public administrations show a strong interest in digital signature technology as a mean for secure and authenticated document exchange, hoping it will help reducing paper-based tr...
Marco Prandini
INFOCOM
2010
IEEE
13 years 6 months ago
Refresh: Weak Privacy Model for RFID Systems
—Privacy-Preserving Authentication (PPA) is crucial for Radio Frequency Identifcation (RFID)-enabled applications. Without appropriate formal privacy models, it is difficult for...
Li Lu, Yunhao Liu, Xiang-Yang Li
EWCBR
1994
Springer
13 years 11 months ago
Integrating Induction and Case-Based Reasoning: Methodological Approach and First Evaluations
We propose in this paper a general framework for integrating inductive and case-based reasoning (CBR) techniques for diagnosis tasks. We present a set of practical integrated appro...
Eric Auriol, Michel Manago, Klaus-Dieter Althoff, ...
CKEC
1991
13 years 11 months ago
Case-Based Reasoning and Model-Based Knowledge Acquisition
We propose in this paper a general framework for integrating inductive and case-based reasoning techniques for diagnosis tasks. We present a set of practical integrated approaches...
Dietmar Janetzko, Gerhard Strube
CORR
2010
Springer
121views Education» more  CORR 2010»
13 years 5 months ago
MiniAgda: Integrating Sized and Dependent Types
Sized types are a modular and theoretically well-understood tool for checking termination of recursive and productivity of corecursive definitions. The essential idea is to track ...
Andreas Abel