Sciweavers

222 search results - page 15 / 45
» Efficient assertion based verification using TLM
Sort
View
ATVA
2004
Springer
138views Hardware» more  ATVA 2004»
15 years 3 months ago
Providing Automated Verification in HOL Using MDGs
While model checking suffers from the state space explosion problem, theorem proving is quite tedious and impractical for verifying complex designs. In this work, we present a veri...
Tarek Mhamdi, Sofiène Tahar
CVPR
2007
IEEE
16 years 1 months ago
A Component-Based Approach to Hand Verification
This paper describes a novel hand-based verification system based on palm-finger segmentation and fusion. The proposed system operates on 2D hand images acquired by placing the ha...
Gholamreza Amayeh, George Bebis, Ali Erol, Mircea ...
PR
2010
141views more  PR 2010»
14 years 6 months ago
On the vulnerability of face verification systems to hill-climbing attacks
In this paper, we use a hill-climbing attack algorithm based on Bayesian adaption to test the vulnerability of two face recognition systems to indirect attacks. The attacking tech...
Javier Galbally, Chris McCool, Julian Fiérr...
CSI
2008
82views more  CSI 2008»
14 years 11 months ago
Efficient and secure protocol in fair document exchange
This paper presents a new fair document exchange protocol based on bilinear pairing with off-line trusted third party (TTP). In such a fair exchange scenario, each party owns a va...
Xiaohui Liang, Zhenfu Cao, Rongxing Lu, Liuquan Qi...
SP
2000
IEEE
15 years 4 months ago
An Efficient, Dynamic and Trust Preserving Public Key Infrastructure
Nested certification is a methodology for efficient certificate path verification. Nested certificates can be used together with classical certificates in the Public Key Infrastru...
Albert Levi, M. Ufuk Çaglayan