Sciweavers

1050 search results - page 5 / 210
» Two methods of authenticated positioning
Sort
View
ISW
2001
Springer
15 years 1 months ago
Suitability of a Classical Analysis Method for E-commerce Protocols
We present the adaptation of our model for the validation of key distribution and authentication protocols to address specific needs of protocols for electronic commerce. The two ...
Sigrid Gürgens, Javier Lopez
91
Voted
CSFW
2005
IEEE
15 years 3 months ago
An Encapsulated Authentication Logic for Reasoning about Key Distribution Protocols
Authentication and secrecy properties are proved by very different methods: the former by local reasoning, leading to matching knowledge of all principals about the order of their...
Iliano Cervesato, Catherine Meadows, Dusko Pavlovi...
ICRA
2000
IEEE
89views Robotics» more  ICRA 2000»
15 years 1 months ago
A Localization Method Based on Two Omnidirectional Perception Systems Cooperation
This paper deals with an absolute localization paradigm based on the cooperation of an omnidirectional vision system and a low cost panoramic range finder system. These two percep...
Arnaud Clerentin, Laurent Delahoche, Claude P&eacu...
ICIAR
2009
Springer
15 years 4 months ago
An Example-Based Two-Step Face Hallucination Method through Coefficient Learning
Face hallucination is to reconstruct a high-resolution face image from a low-resolution one based on a set of high- and low-resolution training image pairs. This paper proposes an ...
Xiang Ma, Junping Zhang, Chun Qi
MHCI
2009
Springer
15 years 4 months ago
User evaluation of lightweight user authentication with a single tri-axis accelerometer
We report a series of user studies that evaluate the feasibility and usability of light-weight user authentication with a single tri-axis accelerometer. We base our investigation ...
Jiayang Liu, Lin Zhong, Jehan Wickramasuriya, Venu...