Now showing items 1-13 of 13

  • Colluding Tags Attack on the ECC-based Grouping Proofs for Rfids 

    Abyaneh, Mohammad Reza Sohizadeh (The author, 2012)
    Recently, a new privacy-preserving elliptic curve based grouping proof protocol with colluding tag prevention( CTP) has been proposed. The CTP protocol is claimed to be resistant against colluding tags attacks in which ...
  • Counting Instances of Software Components 

    Bezem, Marcus A.; Truong, Anh Hoang (University of Bergen, Department of Informatics, 2004-07-13)
    Component software is software that has been assembled from various pieces of standardized, reusable computer programs, so-called components. Executing component software creates instances of these components. For several ...
  • Direct data transfer between SOAP web services in Orchestration 

    Subramanian, Sattanathan; Sztromwasser, Paweł; Puntervoll, Pål; Petersen, Kjell (ACM, 2012)
    In scientific data analysis, workflows are used to integrate and coordinate resources such as databases and tools. Workflows are normally executed by an orchestrator that invokes component services and mediates data ...
  • Interactive Visualization of Streaming Data with Kernel Density Estimation 

    Lampe, Ove Daae; Hauser, Helwig (IEEE, 2011)
    In this paper, we discuss the extension and integration of the statistical concept of Kernel Density Estimation (KDE) in a scatterplotlike visualization for dynamic data at interactive rates. We present a line kernel ...
  • Investigating the Limitations of Java Annotations for Input Validation 

    Mancini, Federico; Hovland, Dag; Mughal, Khalid A. (2010)
    Recently Java annotations have received a lot of attention as a possible way to simplify the usage of various frameworks, ranging from persistence and verification to security. In this paper we discuss our experiences ...
  • A New Generating Set Search Algorithm for Partially Separable Functions 

    Frimannslund, Lennart; Steihaug, Trond (IARIA, 2010)
    A new derivative-free optimization method for unconstrained optimization of partially separable functions is presented. Using average curvature information computed from sampled function values the method generates an ...
  • Obscurance-based Volume Rendering Framework 

    Ruiz, Marc; Boada, Imma; Viola, Ivan; Bruckner, Stefan; Feixas, Miquel; Sbert, Mateu (The Eurographics Association, 2008)
    lighting effects in a faster way than global illumination. Its application in volume visualization is of special interest since it permits us to generate a high quality rendering at a low cost. In this paper, we propose ...
  • On the Privacy of Two Tag Ownership Transfer Protocols for RFIDs 

    Abyaneh, Mohammad Reza Sohizadeh (The author, 2012)
    In this paper, the privacy of two recent RFID tag ownership transfer protocols are investigated against the tag owners as adversaries. The first protocol called ROTIV is a scheme which provides a privacy-preserving ...
  • On the Security of Non-Linear HB (NLHB) Protocol Against Passive Attack 

    Abyaneh, Mohammad Reza Sohizadeh (The author, 2012)
    As a variant of the HB authentication protocol for RFID systems, which relies on the complexity of decoding linear codes against passive attacks, Madhavan et al. presented Non-Linear HB(NLHB) protocol. In contrast to ...
  • Passive Cryptanalysis of the UnConditionally Secure Authentication Protocol for RFID Systems 

    Abyaneh, Mohammad Reza Sohizadeh (The author, 2012)
    Recently, Alomair et al. proposed the first Un- Conditionally Secure mutual authentication protocol for lowcost RFID systems(UCS-RFID). The security of the UCSRFID relies on five dynamic secret keys which are updated at ...
  • Reflections on Courses for Software Language Engineering 

    Bagge, Anya Helene; Lämmel, Ralf; Zaytsev, Vadim (2014)
    Software Language Engineering (SLE) has emerged as a field in computer science research and software engineering, but it has yet to become entrenched as part of the standard curriculum at universities. Many places have a ...
  • Security Analysis of two Distance-Bounding Protocols 

    Abyaneh, Mohammad Reza Sohizadeh (The author, 2012)
    In this paper, we analyze the security of two recently proposed distance bounding protocols called the “Hitomi” and the “NUS” protocols. Our results show that the claimed security of both protocols has been overestima ...
  • The SHIP Validator: An Annotation-based Content-Validation Framework for Java Applications 

    Mancini, Federico; Hovland, Dag; Mughal, Khalid A. (IEEE, 2010)
    In this paper, we investigate the use of Java annotations for software security purposes. In particular, we implement a framework for content validation where the validation tests are specified by annotations. This ...