Sciweavers

2061 search results - page 175 / 413
» Authorization for Metacomputing Applications
Sort
View
ICC
2009
IEEE
125views Communications» more  ICC 2009»
15 years 11 months ago
Cryptanalysis of Substitution Cipher Chaining Mode (SCC)
In this paper, we present an enhanced cryptanalysis of the Substitution Cipher Chaining mode (SCC) [1]. In [2], SCC-128 (SCC which uses AES with 128-bit key) was broken using 5 att...
Mohamed Abo El-Fotouh, Klaus Diepold
IROS
2009
IEEE
158views Robotics» more  IROS 2009»
15 years 11 months ago
Robust 3D-mapping with time-of-flight cameras
— Time-of-Flight cameras constitute a smart and fast technology for 3D perception but lack in measurement precision and robustness. The authors present a comprehensive approach f...
Stefan May, David Droeschel, Stefan Fuchs, Dirk Ho...
VR
2008
IEEE
129views Virtual Reality» more  VR 2008»
15 years 11 months ago
Object-Capability Security in Virtual Environments
Access control is an important aspect of shared virtual environments. Resource access may not only depend on prior authorization, but also on context of usage such as distance or ...
Martin Scheffler, Jan P. Springer, Bernd Froehlich
WISE
2008
Springer
15 years 11 months ago
Mobile Payment: Towards a Customer-Centric Model
Abstract. Mobile payment normally occurs as a wireless transaction of monetary value and includes the initiation, authorization and the realization of the payment. Such transaction...
Krassie Petrova
CEC
2007
IEEE
15 years 11 months ago
A simple genetic algorithm for music generation by means of algorithmic information theory
— Recent large scale experiments have shown that the Normalized Information Distance, an algorithmic information measure, is among the best similarity metrics for melody classiï¬...
Manuel Alfonseca, Manuel Cebrián, Alfonso O...