Sciweavers

269 search results - page 28 / 54
» Templates as Master Keys
Sort
View
CVPR
2009
IEEE
1148views Computer Vision» more  CVPR 2009»
15 years 3 months ago
Shape Constrained Figure-Ground Segmentation and Tracking
Global shape information is an effective top-down complement to bottom-up figure-ground segmentation as well as a useful constraint to avoid drift during adaptive tracking. We p...
Zhaozheng Yin, Robert T. Collins
WS
2010
ACM
13 years 6 months ago
DLEJena: A practical forward-chaining OWL 2 RL reasoner combining Jena and Pellet
This paper describes DLEJena, a practical reasoner for the OWL 2 RL profile that combines the forward-chaining rule engine of Jena and the Pellet DL reasoner. This combination is...
Georgios Meditskos, Nick Bassiliades
ACNS
2008
Springer
138views Cryptology» more  ACNS 2008»
14 years 2 months ago
Traceable and Retrievable Identity-Based Encryption
Abstract. Very recently, the concept of Traceable Identity-based Encryption (IBE) scheme (or Accountable Authority Identity based Encryption scheme) was introduced in Crypto 2007. ...
Man Ho Au, Qiong Huang, Joseph K. Liu, Willy Susil...
ICC
2007
IEEE
125views Communications» more  ICC 2007»
14 years 2 months ago
SFRIC: A Secure Fast Roaming Scheme in Wireless LAN Using ID-Based Cryptography
In a wireless network composed of multiple access points, a long delay during roaming from one access point to another may cause a disruption for streaming traffic. Roaming in wire...
Yoohwan Kim, Wei Ren, Ju-Yeon Jo, Yingtao Jiang, J...
ESORICS
2012
Springer
11 years 11 months ago
Dismantling iClass and iClass Elite
With more than 300 million cards sold, HID iClass is one of the most popular contactless smart cards on the market. It is widely used for access control, secure login and payment s...
Flavio D. Garcia, Gerhard de Koning Gans, Roel Ver...