Sciweavers

1788 search results - page 50 / 358
» Integrating Security into the Curriculum
Sort
View
AGENTS
1998
Springer
15 years 4 months ago
Integrating Active Perception with an Autonomous Robot Architecture
Today's robotics applications require complex, real-time, high-bandwidth sensor systems. Although many such systems have been developed [12][14][17][10], integrating them int...
Glenn S. Wasson, David Kortenkamp, Eric Huber
IEEEARES
2007
IEEE
15 years 6 months ago
Secure Distributed Dossier Management in the Legal Domain
The use of digital dossiers in Courts of Law, although currently in the phase of study, will be common practice in the future. This paper introduces the notion of distributed digi...
Martijn Warnier, Frances M. T. Brazier, Martin Api...
SP
2006
IEEE
104views Security Privacy» more  SP 2006»
15 years 5 months ago
A Logic for Constraint-based Security Protocol Analysis
We propose PS-LTL, a pure-past security linear temporal logic that allows the specification of a variety of authentication, secrecy and data freshness properties. Furthermore, we...
Ricardo Corin, Sandro Etalle, Ari Saptawijaya
IICAI
2003
15 years 1 months ago
Biometric Security Systems: Fingerprint and Speech Technology
: This paper deals with the design of a biometric security system based upon the fingerprint and speech technology. In the first chapter there are the biometric security systems an...
Filip Orság, Martin Drahanský
IJNSEC
2010
127views more  IJNSEC 2010»
14 years 6 months ago
A Better Improvement on the Integrated Diffie-Hellman-DSA Key Agreement Protocol
Harn et al. proposed a series of Diffie-Hellman key exchange protocols which are integrated into Digital Signature Algorithm in 2004. Recently, Phan pointed out that Harn et al.&#...
Jie Liu, Jianhua Li