• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 287
Next 10 →

Security Arguments for Digital Signatures and Blind Signatures

by David Pointcheval, Jacques Stern - JOURNAL OF CRYPTOLOGY , 2000
"... Since the appearance of public-key cryptography in the seminal Diffie-Hellman paper, many new schemes have been proposed and many have been broken. Thus, the ..."
Abstract - Cited by 375 (39 self) - Add to MetaCart
Since the appearance of public-key cryptography in the seminal Diffie-Hellman paper, many new schemes have been proposed and many have been broken. Thus, the

Broken expectations in the digital home

by Sara Bly, Bill Schilit, David W. Mcdonald, Barbara Rosario, Ylian Saint-hilaire - In Proceedings of Computer Human Interaction (CHI , 2006
"... Copyright is held by the author/owner(s). ..."
Abstract - Cited by 9 (0 self) - Add to MetaCart
Copyright is held by the author/owner(s).

M.: Chip and pin is broken

by Steven J. Murdoch, Saar Drimer, Ross Anderson, Mike Bond - In: Proc. IEEE Security & Privacy , 2010
"... Abstract—EMV is the dominant protocol used for smart card payments worldwide, with over 730 million cards in circulation. Known to bank customers as “Chip and PIN”, it is used in Europe; it is being introduced in Canada; and there is pressure from banks to introduce it in the USA too. EMV secures cr ..."
Abstract - Cited by 20 (3 self) - Add to MetaCart
credit and debit card transactions by authenticating both the card and the customer presenting it through a combination of cryptographic authentication codes, digital signatures, and the entry of a PIN. In this paper we describe and demonstrate a protocol flaw which allows criminals to use a genuine card

Broken probes: toward the design of worn media

by Miwa Ikemiya , Daniela K Rosner - Personal and Ubiquitous Computing (online
"... Abstract This article describes the development and use of broken probes: prompted processes of degradation that produce unique identifiers with which to associate and retrieve digitally recorded histories. We offer our design and deployment of Broken Probes as a methodology for eliciting insights ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Abstract This article describes the development and use of broken probes: prompted processes of degradation that produce unique identifiers with which to associate and retrieve digitally recorded histories. We offer our design and deployment of Broken Probes as a methodology for eliciting insights

Linking Broken Character Borders With Variable Sized Masks to Improve Recognition

by Adrian Whichello, Hong Yan , 1995
"... : A novel border following algorithm is used to reconstruct the borders and missing links of noisy and broken handwritten digits. When combined with a suitable rejection threshold, improved performance from handwritten character classifiers is achieved. Experimental results are given which show the ..."
Abstract - Cited by 8 (0 self) - Add to MetaCart
: A novel border following algorithm is used to reconstruct the borders and missing links of noisy and broken handwritten digits. When combined with a suitable rejection threshold, improved performance from handwritten character classifiers is achieved. Experimental results are given which show

Digital Object Identifier The broken sample problem Dedicated to Professor Xiru Chen on His 70th Birthday

by Zhidong Bai , Tailen Hsing , 2005
"... Abstract. Suppose that (X i , Y i ), i = 1, 2, . . . , n, are iid. random vectors with uniform marginals and a certain joint distribution F ρ , where ρ is a parameter with ρ = ρ o corresponds to the independence case. However, the X's and Y 's are observed separately so that the pairing i ..."
Abstract - Add to MetaCart
information is missing. Can ρ be consistently estimated? This is an extension of a problem considered in , is strictly less than 1 for ρ = ρ 1 and ρ 2 . We also consider this result from the perspective of a bivariate empirical process which contains information equivalent to that of the broken sample.

Digital Watermarking

by Michael Stumpfl , 2002
"... As more and more analogue systems are replaced by digital ones, the question of how to deal with piracy of copyrighted digital content is turning into a serious problem. For example, the speed with which the "Content Scrambling System" -- the encryption standard used for DVD video -- was b ..."
Abstract - Add to MetaCart
-- was broken, clearly shows, that encryption on its own is insufficient for many systems in protecting copyrighted material from misuse. Digital Watermarking, on the other hand, relies on the shortcomings of the "human visual system" (HVS) and is about embedding copyright information in a way

Digital Age

by Eric Klinenberg
"... A paradox of contemporary sociology is that the disci-pline has largely abandoned the empirical study of jour-nalistic organizations and news institutions at the moment when the media has gained visibility in political, economic, and cultural spheres; when other academic fields have embraced the stu ..."
Abstract - Add to MetaCart
the study of media and society; and when leading sociological theorists have broken from the disciplinary cannon to argue that the media are key actors in modern life. This article examines the point of journalistic production in one major news organization and shows how reporters and editors manage

A Restoration Method for Broken Handwritten Line-figures with Connecting Terminal Points

by Kazuki Nakashima, Masashi Koga, Katsurni Marukawa, Yoshihiro Shima
"... In some pattern recognition processes bmed on recognizing structural features, a serious problem is poorly-cbawn lines which cause broken parts when a digital bitmap (a binary image) is madeof the line-jgure. This broken pattern changes the pattern structure, and increases the likelihood of rejectio ..."
Abstract - Add to MetaCart
In some pattern recognition processes bmed on recognizing structural features, a serious problem is poorly-cbawn lines which cause broken parts when a digital bitmap (a binary image) is madeof the line-jgure. This broken pattern changes the pattern structure, and increases the likelihood

Detection of Broken Pharmaceutical Drugs using Enhanced Feature Extraction Technique

by unknown authors
"... Medication has become more important in everyone’s life; people are affected by many diseases. There are certain diseases which cannot be cured without medication. The production of medicine has increased a lot in recent days. During production there may be damages like breakage, cracks present in t ..."
Abstract - Add to MetaCart
in the tablets or capsules. Consumption of these damaged tablets may cause some problem in skin, eyes and mouth. Most of the tablets are not advisable to be consumed in broken form. Manual inspection is a very challenging task. Image processing plays a major role in automation of visual inspection. Therefore we
Next 10 →
Results 1 - 10 of 287
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University