Sciweavers

1599 search results - page 65 / 320
» Program Analysis for Security and Privacy
Sort
View
MOC
2010
14 years 10 months ago
Analysis of spectral approximations using prolate spheroidal wave functions
Abstract. In this paper, the approximation properties of the prolate spheroidal wave functions of order zero (PSWFs) are studied, and a set of optimal error estimates are derived f...
Li-lian Wang
110
Voted
AINA
2007
IEEE
15 years 10 months ago
Agri-Food Traceability Management using a RFID System with Privacy Protection
In this paper an agri-food traceability system based on public key cryptography and Radio Frequency Identification (RFID) technology is proposed. In order to guarantee safety in f...
Paolo Bernardi, Claudio Demartini, Filippo Gandino...
123
Voted
WISTP
2007
Springer
15 years 9 months ago
Optimistic Non-repudiation Protocol Analysis
Abstract. Non-repudiation protocols with session labels have a number of vulnerabilities. Recently Cederquist, Corin and Dashti have proposed an optimistic non-repudiation protocol...
Judson Santiago, Laurent Vigneron
134
Voted
ISI
2006
Springer
15 years 3 months ago
Spatial-Temporal Cross-Correlation Analysis: A New Measure and a Case Study in Infectious Disease Informatics
This paper aims to develop a new statistical measure to identify significant correlations among multiple events with spatial and temporal components. This new measure, ( , )K r t ,...
Jian Ma, Daniel Dajun Zeng, Hsinchun Chen
134
Voted
ISI
2006
Springer
15 years 3 months ago
Personal Information Management (PIM) for Intelligence Analysis
The concept of Personal Information Management (PIM) is currently a hot topic of research. Some of the ideas being discussed under this topic have a long history, and they are rele...
Antonio Badia