نتایج جستجو برای: ident

تعداد نتایج: 404  

2004

In this paper I argue that vowel reharmonization anomalies in Tuvan (Harrison 2000) and Finnish (Vago 1988) are best analyzed as cases of “the preservation of the marked,” in the sense of de Lacy (2002). This analysis is more tightly constrained and more explanatory than the underspecification analysis proposed by Harrison (2000) and Harrison and Kaun (2000), and provides support from a new dom...

2013
Swee-Huay Heng

In 2010, Heng and Chin (2010) proposed an identity-based identification (IBI) scheme in the standard model which was resilient to a coalition of attackers conspiring together to break the scheme. They argued that the scheme was desirable due to its proof in the standard model, which is still rare in existing literature. Also desirable was that the proposed scheme was designed without bilinear p...

Journal: :Journal of clinical microbiology 1982
W E Kloos J F Wolfshohl

The API STAPH-IDENT system was compared with conventional methods for the identification of 14 Staphylococcus species. Conventional methods included the Kloos and Schleifer simplified scheme and DNA-DNA hybridization. The API STAPH-IDENT strip utilizes a battery of 10 miniaturized biochemical tests, including alkaline phosphatase, urease, beta-glucosidase, beta-glucuronidase, and beta-galactosi...

2016
Lotfi Jaiem Sébastien Druon Lionel Lapierre Didier Crestani

One of the crucial questions to develop Autonomous Mobile Robotic systems is the energy consumption, its monitoring and management all along the mission. Mission complexity and fault tolerance capabilities require to exploit system redundancies, in terms of algorithms and hardware recruitment. This choice has an evident impact on energy consumption. This paper proposes an identification protoco...

Journal: :JCP 2013
Hao Wang Fengyun Cao Shuai Fang Yang Cao Chunlong Fang

This paper introduces a new concept called controllable ring signature which is ring signature with additional properties as follow. (1) Anonymous identification: by an anonymous identification protocol, the real signer can anonymously prove his authorship of the ring signature to the verifier. And this proof is non-transferable. (2) Linkable signature: the real signer can generate an anonymous...

Journal: :Int. Arab J. Inf. Technol. 2017
Wen Gao Yupu Hu Baocang Wang Jia Xie

Boneh et al. [6] proposed an identification protocol in Asiacrypt 2011 that is secure in the classical random oracle model but insecure in the quantum random oracle model. This paper finds that a constant parameter plays a significant role in the security of the protocol and the variation of this parameter changes the security greatly. Therefore, an improved identification protocol that replace...

Journal: :CoRR 2007
Hassan Jameel Heejo Lee Sungyoung Lee

A secure human identification protocol aims at authenticating human users to a remote server when even the users’ inputs are not hidden from an adversary. Recently, the authors proposed a human identification protocol in the RSA Conference 2007, which is loosely based on the ability of humans to efficiently process an image. The advantage being that an automated adversary is not effective in at...

2010
Sebastián Durango David Restrepo Oscar E. Ruiz John Restrepo-Giraldo Sofiane Achiche

This paper presents a Divide and Conquer strategy to estimate the kinematic parameters of parallel symmetrical mechanisms. The Divide and Conquer kinematic identification is designed and performed independently for each leg of the mechanism. The estimation of the kinematic parameters is performed using the inverse calibration method. The identification poses are selected optimizing the observab...

2004
Raphael C.-W. Phan Huo-Chong Ling

Recently, two generic watermarking protocols were proposed, based on a popular zero-knowledge identification protocol. In this paper, we show that both protocols are flawed and therefore fail to achieve their purpose of allowing a prover to prove to a verifier of his ownership of a watermarked image. We also give some suggestions to fix these flaws. Keyword:Watermark detection protocol, generic...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید