Forgery and counterfeiting are emerging as serious security risks in low-cost pervasive computing devices. These devices lack the computational, storage, power, and communication r...
Abstract. Users are often forced to trust potentially malicious terminals when trying to interact with a remote secure system. This paper presents an approach for ensuring the inte...
Digital signatures and message authentication codes are well known methods for ensuring message integrity. However, they rely on computations which are too hard to be performed by ...
It is natural in a visual search to look at any object that is similar to the target so that it can be recognised and a decision made to end the search. Eye tracking technology of...
This paper addresses the question of how to obtain consistent semantic annotation on the basis of a set of noisy texts. Many potential realworld applications of semantic computing...