Sciweavers

201 search results - page 3 / 41
» Inferring authentication tags
Sort
View
COMCOM
2011
13 years 9 days ago
Scalable RFID security protocols supporting tag ownership transfer
We identify privacy, security and performance requirements for RFID protocols, as well as additional functional requirements such as tag ownership transfer. Many previously propos...
Boyeon Song, Chris J. Mitchell
CCS
2004
ACM
13 years 10 months ago
Authenticity by tagging and typing
We propose a type and effect system for authentication protocols built upon a tagging scheme that formalizes the intended semantics of ciphertexts. The main result is that the val...
Michele Bugliesi, Riccardo Focardi, Matteo Maffei
MHCI
2009
Springer
13 years 12 months ago
iPiccer: automatically retrieving and inferring tagged location information from web repositories
We present iPiccer, a system that allows mobile camera phones users to interact with meta-tagged image material available from web repositories, such as flickr in two novel ways....
Benjamin Proß, Johannes Schöning, Anton...
ESWS
2009
Springer
13 years 12 months ago
Neighborhood-Based Tag Prediction
We consider the problem of tag prediction in collaborative tagging systems where users share and annotate resources on the Web. We put forward HAMLET, a novel approach to automatic...
Adriana Budura, Sebastian Michel, Philippe Cudr&ea...
LFP
1992
140views more  LFP 1992»
13 years 6 months ago
Global Tagging Optimization by Type Inference
Tag handling accounts for a substantial amount of execution cost in latently typed languages such as Common LISP and Scheme, especially on architectures that provide no special ha...
Fritz Henglein