: In the absence of sufficiently optimised public key constructions, anonymous authentication for Radio-Frequency Identification Devices (RFIDs) requires state synchronisation betw...
Anonymity is a very important security feature in addition to authentication and key agreement features in communication protocols. In this paper, we propose two authentication an...
A fundamental challenge that must be met to achieve a usable conversational interface to Geographic Information System (GIS) is how to enable a more natural interaction between th...
Tracking of deformable objects like humans is a basic operation in many surveillance applications. Objects are detected as they enter the field of view of the camera and they are ...
Paul J. Withagen, Klamer Schutte, Frans C. A. Groe...
Recognizing players’ affective state while playing video games has been the focus of many recent research studies. In this paper we describe the process that has been followed t...
Noor Shaker, Stylianos Asteriadis, Georgios N. Yan...