Sciweavers

10602 search results - page 146 / 2121
» Weakly Useful Sequences
Sort
View
ISICT
2003
15 years 5 months ago
On the automated implementation of modal logics used to verify security protocols
: Formal verification provides a rigid and thorough means of evaluating the correctness of cryptographic protocols so that even subtle defects can be identified. As the application...
Tom Coffey, Reiner Dojen, Tomas Flanagan
CHI
2003
ACM
16 years 4 months ago
Cultural usability: a localization study of mobile text messaging use
The success of mobile text messaging poses many questions for usability studies. Considering the inherent usability weaknesses of mobile phones such as the small display, poor inp...
Huatong Sun
HICSS
2007
IEEE
131views Biometrics» more  HICSS 2007»
15 years 10 months ago
The Use of Attack and Protection Trees to Analyze Security for an Online Banking System
Online banking has become increasingly important to the profitability of financial institutions as well as adding convenience for their customers. As the number of customers using...
Kenneth S. Edge, Richard A. Raines, Michael R. Gri...
ICMCS
2007
IEEE
164views Multimedia» more  ICMCS 2007»
15 years 10 months ago
Constructing Secure Content-Dependent Watermarking Scheme using Homomorphic Encryption
Content-dependent watermarking (CDWM) has been proposed as a solution to overcome the potential estimation attack aiming to recover and remove the watermark from the host signal. ...
Zhi Li, Xinglei Zhu, Yong Lian, Qibin Sun
EVOW
2005
Springer
15 years 9 months ago
Granular Sampling Using a Pulse-Coupled Network of Spiking Neurons
Abstract. We present a new technique for granular sampling using a pulsecoupled network of spiking artificial neurons to generate grain events. The system plays randomly selected s...
Eduardo Reck Miranda, John Matthias