This paper presents a formal security policy model for SmartCards with digital signature application. This kind of model is necessary for each evaluation according to Information ...
Abstract. We present a universally composable time-stamping scheme based on universal one-way hash functions. The model we use contains an ideal auditing functionality (implementab...
Since several years, ubiquitous computing and pervasive computing has emerged and, in particular, context-aware computing. Using mobile devices, the context is perpetually evolvin...
An important problem in many computer vision tasks is the separation of an object from its background. One common strategy is to estimate appearance models of the object and backgr...
Christian Schmaltz, Bodo Rosenhahn, Thomas Brox, J...
Our ongoing work aims at defining an ontology-centered approach for building expertise models for the CommonKADS methodology. This approach (which is named "OntoKADS") i...