نتایج جستجو برای: ident
تعداد نتایج: 404 فیلتر نتایج به سال:
In this paper I argue that vowel reharmonization anomalies in Tuvan (Harrison 2000) and Finnish (Vago 1988) are best analyzed as cases of “the preservation of the marked,” in the sense of de Lacy (2002). This analysis is more tightly constrained and more explanatory than the underspecification analysis proposed by Harrison (2000) and Harrison and Kaun (2000), and provides support from a new dom...
In 2010, Heng and Chin (2010) proposed an identity-based identification (IBI) scheme in the standard model which was resilient to a coalition of attackers conspiring together to break the scheme. They argued that the scheme was desirable due to its proof in the standard model, which is still rare in existing literature. Also desirable was that the proposed scheme was designed without bilinear p...
The API STAPH-IDENT system was compared with conventional methods for the identification of 14 Staphylococcus species. Conventional methods included the Kloos and Schleifer simplified scheme and DNA-DNA hybridization. The API STAPH-IDENT strip utilizes a battery of 10 miniaturized biochemical tests, including alkaline phosphatase, urease, beta-glucosidase, beta-glucuronidase, and beta-galactosi...
One of the crucial questions to develop Autonomous Mobile Robotic systems is the energy consumption, its monitoring and management all along the mission. Mission complexity and fault tolerance capabilities require to exploit system redundancies, in terms of algorithms and hardware recruitment. This choice has an evident impact on energy consumption. This paper proposes an identification protoco...
This paper introduces a new concept called controllable ring signature which is ring signature with additional properties as follow. (1) Anonymous identification: by an anonymous identification protocol, the real signer can anonymously prove his authorship of the ring signature to the verifier. And this proof is non-transferable. (2) Linkable signature: the real signer can generate an anonymous...
Boneh et al. [6] proposed an identification protocol in Asiacrypt 2011 that is secure in the classical random oracle model but insecure in the quantum random oracle model. This paper finds that a constant parameter plays a significant role in the security of the protocol and the variation of this parameter changes the security greatly. Therefore, an improved identification protocol that replace...
A secure human identification protocol aims at authenticating human users to a remote server when even the users’ inputs are not hidden from an adversary. Recently, the authors proposed a human identification protocol in the RSA Conference 2007, which is loosely based on the ability of humans to efficiently process an image. The advantage being that an automated adversary is not effective in at...
This paper presents a Divide and Conquer strategy to estimate the kinematic parameters of parallel symmetrical mechanisms. The Divide and Conquer kinematic identification is designed and performed independently for each leg of the mechanism. The estimation of the kinematic parameters is performed using the inverse calibration method. The identification poses are selected optimizing the observab...
Recently, two generic watermarking protocols were proposed, based on a popular zero-knowledge identification protocol. In this paper, we show that both protocols are flawed and therefore fail to achieve their purpose of allowing a prover to prove to a verifier of his ownership of a watermarked image. We also give some suggestions to fix these flaws. Keyword:Watermark detection protocol, generic...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید