We present a new verification algorithm for security protocols that allows for unbounded verification, falsification, and complete characterization. The algorithm provides a numbe...
Abstract. We investigate several alternate characterizations of pseudorandom functions (PRFs) and pseudorandom permutations (PRPs) in a concrete security setting. By analyzing the ...
This work is inspired by a paper of Hertel and Pott on maximum non-linear functions [8]. Geometrically, these functions correspond with quasi-quadrics; objects introduced in [5]. ...
Temporal segmentation of video is a necessary rst step to indexing digital video for browsing and retrieval. A number of di erent video temporal segmentation algorithms have been ...
This paper investigates a novel computational approach to thyroid tissue characterization in ultrasound images. It is based on the hypothesis that tissues in thyroid ultrasound im...
Michalis A. Savelonas, Dimitrios K. Iakovidis, Nik...