Sciweavers

631 search results - page 19 / 127
» Strong Authentication and Strong Integrity (SASI) Is Not Tha...
Sort
View
ATAL
2007
Springer
14 years 1 months ago
Integrating authority, deontics, and communications within a joint intention framework
Many agents are fielded within environments requiring modeling traditional organizational structures such as military hierarchies and corporations, with their associated authority...
Marcus J. Huber, Sanjeev Kumar, David McGee, Sean ...
ICPR
2008
IEEE
14 years 8 months ago
A method of small object detection and tracking based on particle filters
In this paper an efficient method of small object localization is proposed that integrates detection and tracking. The system is initialized using a strong detector and then it lo...
Chao Zhang, Joan Llach, Yu Huang
EDBT
2010
ACM
138views Database» more  EDBT 2010»
14 years 12 days ago
How to authenticate graphs without leaking
Secure data sharing in multi-party environments requires that both authenticity and confidentiality of the data be assured. Digital signature schemes are commonly employed for au...
Ashish Kundu, Elisa Bertino
ACL
2009
13 years 5 months ago
Incorporating Information Status into Generation Ranking
We investigate the influence of information status (IS) on constituent order in German, and integrate our findings into a loglinear surface realisation ranking model. We show that...
Aoife Cahill, Arndt Riester
TCC
2009
Springer
177views Cryptology» more  TCC 2009»
14 years 8 months ago
Composability and On-Line Deniability of Authentication
Abstract. Protocols for deniable authentication achieve seemingly paradoxical guarantees: upon completion of the protocol the receiver is convinced that the sender authenticated th...
Yevgeniy Dodis, Jonathan Katz, Adam Smith, Shabsi ...