Sciweavers

48 search results - page 10 / 10
» acs 2005
Sort
View
RTA
2005
Springer
13 years 10 months ago
Intruder Deduction for AC-Like Equational Theories with Homomorphisms
Cryptographic protocols are small programs which involve a high level of concurrency and which are difficult to analyze by hand. The most successful methods to verify such protocol...
Pascal Lafourcade, Denis Lugiez, Ralf Treinen
EUROPKI
2005
Springer
13 years 10 months ago
A Heterogeneous Network Access Service Based on PERMIS and SAML
Abstract The expansion of inter-organizational scenarios based on different authorization schemes involves the development of integration solutions allowing different authorizatio...
Gabriel López Millán, Óscar C...
PCM
2004
Springer
124views Multimedia» more  PCM 2004»
13 years 10 months ago
Audio-Assisted Video Browsing for DVD Recorders
We present an audio-assisted video browsing system for a Hard Disk Drive (HDD) enhanced DVD recorder. We focus on our sports highlights extraction based on audio classification. ...
Ajay Divakaran, Isao Otsuka, Regunathan Radhakrish...