Sciweavers

5722 search results - page 283 / 1145
» Security Function Interactions
Sort
View
MOC
2010
14 years 10 months ago
On the numerical evaluation of Fredholm determinants
Some significant quantities in mathematics and physics are most naturally expressed as the Fredholm determinant of an integral operator, most notably many of the distribution funct...
Folkmar Bornemann
ACNS
2008
Springer
103views Cryptology» more  ACNS 2008»
15 years 9 months ago
PUF-HB: A Tamper-Resilient HB Based Authentication Protocol
We propose a light-weight protocol for authentication of low-power devices. Our construction PUF-HB merges the positive qualities of two families of authentication functions. PUF ...
Ghaith Hammouri, Berk Sunar
ACNS
2010
Springer
159views Cryptology» more  ACNS 2010»
15 years 8 months ago
A Message Recognition Protocol Based on Standard Assumptions
We look at the problem of designing Message Recognition Protocols (MRP) and note that all proposals available in the literature have relied on security proofs which hold in the ran...
Atefeh Mashatan, Serge Vaudenay
150
Voted
DIMEA
2008
137views Multimedia» more  DIMEA 2008»
15 years 5 months ago
Biometric tendency recognition and classification system: an artistic approach
The Biometric Tendency Recognition and Classification System is a software application that continuously measures a participant's physiological responses to a given image and...
Carlos Castellanos, Philippe Pasquier, Luther Thie...
INTERACT
2007
15 years 4 months ago
ICEbox: Toward Easy-to-Use Home Networking
Home networking is becoming an essential part of everyday life. However, empirical studies and consumer reports indicate that the complexities of configuring and maintaining the ho...
Jeonghwa Yang, W. Keith Edwards