Sciweavers

1123 search results - page 2 / 225
» Network Protocol System Fingerprinting - A Formal Approach
Sort
View
ICCSA
2007
Springer
13 years 11 months ago
Tracing Illegal Users of Video: Reconsideration of Tree-Specific and Endbuyer-Specific Methods
In our recent study, we have presented an approach for tracing illegal users in content distribution networks using watermarking and fingerprinting techniques [1][2]. In this paper...
Hyun-Ho Kang, Brian M. Kurkoski, Kazuhiko Yamaguch...
ACISICIS
2009
IEEE
13 years 8 months ago
A Novel Approach Based on PCNNs Template for Fingerprint Image Thinning
A PCNNs-based square-and-triangle-template method for binary fingerprint image thinning is proposed. The algorithm is iterative, in which a combined sequential and parallel proces...
Dacheng Xu, Bailiang Li, Anton Nijholt
ICNP
2002
IEEE
13 years 9 months ago
A Formal Approach for Passive Testing of Protocol Data Portions
David Lee, Dongluo Chen, Ruibing Hao, Raymond E. M...
PERCOM
2010
ACM
13 years 3 months ago
Crowdsourced radiomap for room-level place recognition in urban environment
Abstract—The proliferation of WLAN infrastructures has facilitated numerous indoor localization techniques using WLAN fingerprints. In particular, identifying a room or a place i...
Minkyu Lee, Hyunil Yang, Dongsoo Han, Chansu Yu
CORR
2011
Springer
216views Education» more  CORR 2011»
12 years 12 months ago
Approaches to Formal Verification of Security Protocols
— In recent times, many protocols have been proposed to provide security for various information and communication systems. Such protocols must be tested for their functional cor...
Suvansh Lal, Mohit Jain, Vikrant Chaplot