Sciweavers

1050 search results - page 24 / 210
» Two methods of authenticated positioning
Sort
View
ICDAR
2009
IEEE
15 years 6 months ago
A Laplacian Method for Video Text Detection
In this paper, we propose an efficient text detection method based on the Laplacian operator. The maximum gradient difference value is computed for each pixel in the Laplacian-fil...
Trung Quy Phan, Palaiahnakote Shivakumara, Chew Li...
TCS
2002
14 years 11 months ago
Authentication tests and the structure of bundles
Suppose a principal in a cryptographic protocol creates and transmits a message containing a new value v, later receiving v back in a different cryptographic context. It can concl...
Joshua D. Guttman, F. Javier Thayer
SEAL
1998
Springer
15 years 4 months ago
Evolutionary Programming-Based Uni-vector Field Method for Fast Mobile Robot Navigation
Most of the obstacle avoidance techniques do not consider the robot orientation or its nal angle at the target position. These techniques deal with the robot position only and are ...
Yong-Jae Kim, Dong-Han Kim, Jong-Hwan Kim
SP
2006
IEEE
143views Security Privacy» more  SP 2006»
15 years 5 months ago
Cognitive Authentication Schemes Safe Against Spyware (Short Paper)
Can we secure user authentication against eavesdropping adversaries, relying on human cognitive functions alone, unassisted by any external computational device? To accomplish thi...
Daphna Weinshall
ISW
2004
Springer
15 years 5 months ago
Practical Authenticated Key Agreement Using Passwords
Due to the low entropy of human-memorable passwords, it is not easy to conduct password authenticated key agreement in a secure manner. Though there are many protocols achieving th...
Taekyoung Kwon