Results 1 - 10
of
287
Security Arguments for Digital Signatures and Blind Signatures
- JOURNAL OF CRYPTOLOGY
, 2000
"... Since the appearance of public-key cryptography in the seminal Diffie-Hellman paper, many new schemes have been proposed and many have been broken. Thus, the ..."
Abstract
-
Cited by 375 (39 self)
- Add to MetaCart
Since the appearance of public-key cryptography in the seminal Diffie-Hellman paper, many new schemes have been proposed and many have been broken. Thus, the
Broken expectations in the digital home
- In Proceedings of Computer Human Interaction (CHI
, 2006
"... Copyright is held by the author/owner(s). ..."
M.: Chip and pin is broken
- In: Proc. IEEE Security & Privacy
, 2010
"... Abstract—EMV is the dominant protocol used for smart card payments worldwide, with over 730 million cards in circulation. Known to bank customers as “Chip and PIN”, it is used in Europe; it is being introduced in Canada; and there is pressure from banks to introduce it in the USA too. EMV secures cr ..."
Abstract
-
Cited by 20 (3 self)
- Add to MetaCart
credit and debit card transactions by authenticating both the card and the customer presenting it through a combination of cryptographic authentication codes, digital signatures, and the entry of a PIN. In this paper we describe and demonstrate a protocol flaw which allows criminals to use a genuine card
Broken probes: toward the design of worn media
- Personal and Ubiquitous Computing (online
"... Abstract This article describes the development and use of broken probes: prompted processes of degradation that produce unique identifiers with which to associate and retrieve digitally recorded histories. We offer our design and deployment of Broken Probes as a methodology for eliciting insights ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
Abstract This article describes the development and use of broken probes: prompted processes of degradation that produce unique identifiers with which to associate and retrieve digitally recorded histories. We offer our design and deployment of Broken Probes as a methodology for eliciting insights
Linking Broken Character Borders With Variable Sized Masks to Improve Recognition
, 1995
"... : A novel border following algorithm is used to reconstruct the borders and missing links of noisy and broken handwritten digits. When combined with a suitable rejection threshold, improved performance from handwritten character classifiers is achieved. Experimental results are given which show the ..."
Abstract
-
Cited by 8 (0 self)
- Add to MetaCart
: A novel border following algorithm is used to reconstruct the borders and missing links of noisy and broken handwritten digits. When combined with a suitable rejection threshold, improved performance from handwritten character classifiers is achieved. Experimental results are given which show
Digital Object Identifier The broken sample problem Dedicated to Professor Xiru Chen on His 70th Birthday
, 2005
"... Abstract. Suppose that (X i , Y i ), i = 1, 2, . . . , n, are iid. random vectors with uniform marginals and a certain joint distribution F ρ , where ρ is a parameter with ρ = ρ o corresponds to the independence case. However, the X's and Y 's are observed separately so that the pairing i ..."
Abstract
- Add to MetaCart
information is missing. Can ρ be consistently estimated? This is an extension of a problem considered in , is strictly less than 1 for ρ = ρ 1 and ρ 2 . We also consider this result from the perspective of a bivariate empirical process which contains information equivalent to that of the broken sample.
Digital Watermarking
, 2002
"... As more and more analogue systems are replaced by digital ones, the question of how to deal with piracy of copyrighted digital content is turning into a serious problem. For example, the speed with which the "Content Scrambling System" -- the encryption standard used for DVD video -- was b ..."
Abstract
- Add to MetaCart
-- was broken, clearly shows, that encryption on its own is insufficient for many systems in protecting copyrighted material from misuse. Digital Watermarking, on the other hand, relies on the shortcomings of the "human visual system" (HVS) and is about embedding copyright information in a way
Digital Age
"... A paradox of contemporary sociology is that the disci-pline has largely abandoned the empirical study of jour-nalistic organizations and news institutions at the moment when the media has gained visibility in political, economic, and cultural spheres; when other academic fields have embraced the stu ..."
Abstract
- Add to MetaCart
the study of media and society; and when leading sociological theorists have broken from the disciplinary cannon to argue that the media are key actors in modern life. This article examines the point of journalistic production in one major news organization and shows how reporters and editors manage
A Restoration Method for Broken Handwritten Line-figures with Connecting Terminal Points
"... In some pattern recognition processes bmed on recognizing structural features, a serious problem is poorly-cbawn lines which cause broken parts when a digital bitmap (a binary image) is madeof the line-jgure. This broken pattern changes the pattern structure, and increases the likelihood of rejectio ..."
Abstract
- Add to MetaCart
In some pattern recognition processes bmed on recognizing structural features, a serious problem is poorly-cbawn lines which cause broken parts when a digital bitmap (a binary image) is madeof the line-jgure. This broken pattern changes the pattern structure, and increases the likelihood
Detection of Broken Pharmaceutical Drugs using Enhanced Feature Extraction Technique
"... Medication has become more important in everyone’s life; people are affected by many diseases. There are certain diseases which cannot be cured without medication. The production of medicine has increased a lot in recent days. During production there may be damages like breakage, cracks present in t ..."
Abstract
- Add to MetaCart
in the tablets or capsules. Consumption of these damaged tablets may cause some problem in skin, eyes and mouth. Most of the tablets are not advisable to be consumed in broken form. Manual inspection is a very challenging task. Image processing plays a major role in automation of visual inspection. Therefore we
Results 1 - 10
of
287