Sciweavers

1116 search results - page 140 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
CCS
2004
ACM
15 years 6 months ago
Privacy and security in library RFID: issues, practices, and architectures
We expose privacy issues related to Radio Frequency Identification (RFID) in libraries, describe current deployments, and suggest novel architectures for library RFID. Libraries ...
David Molnar, David Wagner
CSFW
2002
IEEE
15 years 5 months ago
Types and Effects for Asymmetric Cryptographic Protocols
We present the first type and effect system for proving authenticity properties of security protocols based on asymmetric cryptography. The most significant new features of our ...
Andrew D. Gordon, Alan Jeffrey
PR
2010
151views more  PR 2010»
14 years 11 months ago
Coupled region-edge shape priors for simultaneous localization and figure-ground segmentation
We propose a new algorithm for simultaneous localization and figure-ground segmentation where coupled region-edge shape priors are involved with two different but complementary ...
Cheng Chen, Guoliang Fan
80
Voted
SIAMAM
2008
94views more  SIAMAM 2008»
15 years 16 days ago
Diffusion of Protein Receptors on a Cylindrical Dendritic Membrane with Partially Absorbing Traps
Abstract. We present a model of protein receptor trafficking within the membrane of a cylindrical dendrite containing small protrusions called spines. Spines are the locus of most ...
Paul C. Bressloff, Berton A. Earnshaw, Michael J. ...
TSD
2010
Springer
14 years 10 months ago
Listening-Test-Based Annotation of Communicative Functions for Expressive Speech Synthesis
This paper is focused on the evaluation of listening test that was realized with a view to objectively annotate expressive speech recordings and further develop a limited domain ex...
Martin Gruber, Jindrich Matousek