Sciweavers

550 search results - page 67 / 110
» A lightweight approach to state based security testing
Sort
View
MA
1997
Springer
149views Communications» more  MA 1997»
15 years 1 months ago
Java-Based Mobile Agents - How to Migrate, Persist, and Interact on Electronic Service Markets
This paper presents a mobile agent approach that aims at satisfying the following requirements of open Internet-based electronic service markets: the mobile agent system should be...
Boris Liberman, Frank Griffel, Michael Merz, Winfr...
ICCV
2007
IEEE
15 years 11 months ago
Probabilistic Color and Adaptive Multi-Feature Tracking with Dynamically Switched Priority Between Cues
We present a probabilistic multi-cue tracking approach constructed by employing a novel randomized template tracker and a constant color model based particle filter. Our approach ...
François Le Clerc, Lionel Oisel, Patrick P&...
CSFW
1999
IEEE
15 years 2 months ago
A Meta-Notation for Protocol Analysis
Most formal approaches to security protocol analysis are based on a set of assumptions commonly referred to as the "Dolev-Yao model." In this paper, we use a multiset re...
Iliano Cervesato, Nancy A. Durgin, Patrick Lincoln...
ESANN
2006
14 years 11 months ago
Spatial filters for the classification of event-related potentials
Spatial filtering is a widely used dimension reduction method in electroencephalogram based brain-computer interface systems. In this paper a new algorithm is proposed, which learn...
Ulrich Hoffmann, Jean-Marc Vesin, Touradj Ebrahimi
ICIAR
2010
Springer
15 years 2 months ago
Two-Factor Authentication or How to Potentially Counterfeit Experimental Results in Biometric Systems
Two-factor authentication has been introduced in order to enhance security in authentication systems. Different factors have been introduced, which are combined for means of contr...
Christian Rathgeb, Andreas Uhl