Sciweavers

1466 search results - page 3 / 294
» Completeness of the Authentication Tests
Sort
View
COMCOM
1999
78views more  COMCOM 1999»
13 years 5 months ago
A complete test sequence using cyclic sequence for conformance testing
We present a problem of commonly used characterization sequences (CS) for the protocol conformance testing and propose a new test sequence to resolve the problem. The proposed tes...
DaeHun Nyang, S. Y. Lim, JooSeok Song
IJNSEC
2008
146views more  IJNSEC 2008»
13 years 5 months ago
Formal Protocol Design of ESIKE Based on Authentication Tests
In this paper, we first present a concrete formal protocol design approach, which is based on authentication tests, to create an Efficient and Secure Internet Key Exchange (ESIKE)...
Rui Jiang, Aiqun Hu, Jianhua Li
MEDIAFORENSICS
2010
13 years 7 months ago
Multimodal object authentication with random projections: a worst-case approach
In this paper, we consider a forensic multimodal authentication framework based on binary hypothesis testing in random projections domain. We formulate a generic authentication pr...
Oleksiy J. Koval, Sviatoslav Voloshynovskiy
FORTE
2003
13 years 7 months ago
Correct Passive Testing Algorithms and Complete Fault Coverage
The aim of passive testing is to detect faults in a system while observing the system during normal operation, that is, without forcing the system to specialized inputs explicitly ...
Arun N. Netravali, Krishan K. Sabnani, Ramesh Visw...
ETS
2006
IEEE
106views Hardware» more  ETS 2006»
13 years 11 months ago
"Analogue Network of Converters": A DFT Technique to Test a Complete Set of ADCs and DACs Embedded in a Complex SiP or SOC
In this paper, complex mixed signal circuits such as SiP or SOC including several ADCs and DACs are considered. A new DFT technique is proposed allowing the test of this complete ...
Vincent Kerzerho, Philippe Cauvet, Serge Bernard, ...