نتایج جستجو برای: cards model

تعداد نتایج: 2113502  

2008
S. Davtyan S. Kentros N. Nicolaou A. See N. Shashidhar

The UConn VoTeR Center performed an audit of the pre-election memory cards for the AccuVote Optical Scan tabulators that were to be used in the November 2007 Connecticut Elections. The cards were programmed by LHS Associates of Methuen, Massachusetts, and shipped to the towns in Connecticut. The towns were instructed to test the cards and to choose randomly one out of each four cards per distri...

Journal: :IRMJ 2015
Ehsan Saghehei Azizollah Memariani

The approach used in this paper is an implementation of a data mining process against real-life transactions of debit cards with the aim of detecting suspicious behavior. The framework designed for this purpose has been obtained through merging supervised and unsupervised models. First, due to unlabeled data, Twostep and Self-Organizing Map algorithms have been used in clustering the transactio...

Journal: :New Generation Computing 2022

Abstract This paper shows new card-based cryptographic protocols using private operations that are secure against malicious players. Physical cards used in instead of computers. Operations a player executes place where the other players cannot see called operations. Using several operations, calculations two variable Boolean functions and copy were realized with minimum number cards. Though ver...

Journal: :CoRR 2008
C. Aiswarya K. Murali Krishnan

In this paper it is shown that no public announcement scheme that can be modeled in Dynamic Epistemic Logic (DEL) can solve the Russian Cards Problem (RCP) in one announcement. Since DEL is a general model for any public announcement scheme [11], [3], [6], [21], [12] we conclude that there exist no single announcement solution to the RCP. The proof demonstrates the utility of DEL in proving low...

2005
Biliana ALEXANDROVA-KABADJOVA Edward TSANG Andreas KRAUSE

This paper investigates the market structure of the payment card market with consumers and merchants basing their subscription decisions on various information sets. We find that the market structure depends crucially on this information set, where we observe that a market with few cards dominating only emerges when decisions are based on very limited information. For more complete information ...

2000
Sebastien JEAN Didier DONSEZ Sylvain LECOMTE

Wide distributed applications involve several partners, this requires security features when the software components are deployed between the partners. Moreover, the end-user is more and more nomadic and uses several terminals to browse his services. We believe smart cards can be used to meet these new requirements. However, smart cards acts mainly as isolated servers. We propose to improve the...

2016
Wuyi Wang Peter C. B. Phillips Liangjun Su Peter C.B. Phillips

This paper studies estimation of a panel data model with latent structures where individuals can be classified into different groups where slope parameters are homogeneous within the same group but heterogeneous across groups. To identify the unknown group structure of vector parameters, we design an algorithm called Panel-CARDS which is a systematic extension of the CARDS procedure proposed by...

2011
Henryk Plötz Karsten Nohl

The Legic Prime system uses proprietary RFIDs to secure building access and micropayment applications. The employed algorithms rely on obscurity and consequently did not withstand scrutiny. This paper details how the algorithms were found from opening silicon chips as well as interacting with tags and readers. The security of the tags is based on several secret check-sums but no secret keys are...

2000
Jiahai Yang Peng Ning Xiaoyang Sean Wang Sushil Jajodia

A major research problem in intrusion detection is the efficient Detection of coordinated attacks over large networks. Issues to be resolved include determining what data should be collected, which portion of the data should be analyzed, where the analysis of the data should take place, and how to correlate multi-source information. This paper proposes the architecture of a Coordinated Attack R...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید