نتایج جستجو برای: identification scheme
تعداد نتایج: 625502 فیلتر نتایج به سال:
This paper describes an identification and authentication protocol for RFID tags with two contributions aiming at enhancing the security and privacy of RFID based systems. First, we assume that some of the servers storing the information related to the tags can be compromised. In order to protect the tags from potentially malicious servers, we devise a technique that makes RFID identification s...
Many nonlinear systems can be described by a Wiener-Schetzen model. In this model, the linear dynamics are formulated in terms of orthonormal basis functions (OBFs). The nonlinearity is modeled by a multivariate polynomial. In general, an infinite number of OBFs is needed for an exact representation of the system. This paper considers the approximation of a Wiener system with finite-order infin...
This contribution presents a kinetic model identification scheme that guarantees convergence to global optimality. The use of the extent-based incremental approach allows one to (i) identify each reaction individually, and (ii) reduce the number of parameters to identify via optimization to the ones that appear nonlinearly in the investigated rate law. Via Taylor expansion, the identification p...
This paper characterizes, for an arbitrary model with invertible vector autoregressive representation and for an arbitrary set of identification restrictions, the set of impulse vectors consistent with the proposed identification scheme. For identification procedures that afford point identification this means recovery of the unique identified impulse vector; for set-identifying restrictions, t...
This paper characterizes, for an arbitrary linear state-space model with autoregressive representation of the observables and for an arbitrary set of identification restrictions, the set of impulse vectors consistent with the proposed identification scheme. For identification procedures that afford point identification this means recovery of the unique identified impulse vector; for set-identif...
This paper proposes a personal identification method to express numbers by using hand gestures. A new set of hand patterns has been devised to express each number to decrease the recognition errors and for each user to easily memorize them. The normalized correlation value between a registered grayscale image and an input grayscale image is used for recognizing each hand pattern. Threshold valu...
In this paper, we show that two variants of Stern’s identification scheme [IEEE IT ’96] are provably secure against concurrent attacks under the assumptions on the worst-case hardness of lattice problems. These assumptions are weaker than those for the existing schemes of Micciancio and Vadhan [CRYPTO ’03] and of Lyubashevsky [PKC ’08]. We also construct ad hoc anonymous identification schemes ...
In this paper, based on the features of dice images and the least distance criterion (LDC) method, we developed an autorecognition scheme for dice games. First, we use R plane to replace gray-scale image to speed up processing. Next, we use O’stu method to convert the R plane into binary. Furthermore, image pre-processing steps are used to filter out the noise, and a non-circular object discard...
In this paper, we analyze an RFID identification scheme which is designed to provide forward untraceability and backward untraceability. We show that if a standard cryptographic pseudorandom bit generator (PRBG) is used in the scheme, then the scheme may fail to provide forward untraceability and backward untraceability. To achieve the desired untraceability features, the scheme can use a robus...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید