Sciweavers

2399 search results - page 46 / 480
» On Authentication between Human and Computer
Sort
View
IJACT
2008
136views more  IJACT 2008»
14 years 9 months ago
Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries
: In the absence of sufficiently optimised public key constructions, anonymous authentication for Radio-Frequency Identification Devices (RFIDs) requires state synchronisation betw...
Mike Burmester, Breno de Medeiros, Rossana Motta
IJNSEC
2006
78views more  IJNSEC 2006»
14 years 9 months ago
Authentication and Key Agreement Protocols Preserving Anonymity
Anonymity is a very important security feature in addition to authentication and key agreement features in communication protocols. In this paper, we propose two authentication an...
Kumar V. Mangipudi, Rajendra S. Katti, Huirong Fu
ICTAI
2008
IEEE
15 years 4 months ago
GeoDialogue: A Software Agent Enabling Collaborative Dialogues between a User and a Conversational GIS
A fundamental challenge that must be met to achieve a usable conversational interface to Geographic Information System (GIS) is how to enable a more natural interaction between th...
Hongmei Wang, Guoray Cai, Alan M. MacEachren
ICPR
2004
IEEE
15 years 10 months ago
Probabilistic Classification Between Foreground Objects and Background
Tracking of deformable objects like humans is a basic operation in many surveillance applications. Objects are detected as they enter the field of view of the camera and they are ...
Paul J. Withagen, Klamer Schutte, Frans C. A. Groe...
ACII
2011
Springer
13 years 9 months ago
A Game-Based Corpus for Analysing the Interplay between Game Context and Player Experience
Recognizing players’ affective state while playing video games has been the focus of many recent research studies. In this paper we describe the process that has been followed t...
Noor Shaker, Stylianos Asteriadis, Georgios N. Yan...