We present the adaptation of our model for the validation of key distribution and authentication protocols to address specific needs of protocols for electronic commerce. The two ...
Authentication and secrecy properties are proved by very different methods: the former by local reasoning, leading to matching knowledge of all principals about the order of their...
This paper deals with an absolute localization paradigm based on the cooperation of an omnidirectional vision system and a low cost panoramic range finder system. These two percep...
Arnaud Clerentin, Laurent Delahoche, Claude P&eacu...
Face hallucination is to reconstruct a high-resolution face image from a low-resolution one based on a set of high- and low-resolution training image pairs. This paper proposes an ...
We report a series of user studies that evaluate the feasibility and usability of light-weight user authentication with a single tri-axis accelerometer. We base our investigation ...
Jiayang Liu, Lin Zhong, Jehan Wickramasuriya, Venu...