Sciweavers

234 search results - page 39 / 47
» Proof Nets and the Identity of Proofs
Sort
View
96
Voted
TPDS
2008
116views more  TPDS 2008»
14 years 10 months ago
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps
Most trust models in Peer-to-Peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence,...
Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Hu...
CVPR
2007
IEEE
16 years 3 days ago
Approximate Nearest Subspace Search with Applications to Pattern Recognition
Linear and affine subspaces are commonly used to describe appearance of objects under different lighting, viewpoint, articulation, and identity. A natural problem arising from the...
Ronen Basri, Tal Hassner, Lihi Zelnik-Manor
ISCAS
2008
IEEE
129views Hardware» more  ISCAS 2008»
15 years 4 months ago
Physical unclonable function with tristate buffers
— The lack of robust tamper-proofing techniques in security applications has provided attackers the ability to virtually circumvent mathematically strong cryptographic primitive...
Erdinç Öztürk, Ghaith Hammouri, B...
ANSS
2007
IEEE
15 years 4 months ago
Evaluating the Design of Biological Cells Using a Computer Workbench
For embedded systems as well as for biological cell systems, design is a feature that defines their identity. The assembly of different components in designs of both systems can ...
Tessa E. Pronk, Simon Polstra, Andy D. Pimentel, T...
OTM
2007
Springer
15 years 4 months ago
Trust Management Model and Architecture for Context-Aware Service Platforms
The entities participating in a context-aware service platform need to establish and manage trust relationships in order to assert different trust aspects including identity provis...
Ricardo Neisse, Maarten Wegdam, Marten van Sindere...