Abstracts - faqs.org

Abstracts

Electronics

Search abstracts:
Abstracts » Electronics

Protocol failures in cryptosystems

Article Abstract:

A cryptosystem functions within the framework of a protocol that specifies data handling procedures to ensure the security or authentication required by the system. Unfortunately, poorly designed or implemented protocols can compromise the cryptoalgorithm used to secure the data. Protocol types that have been compromised include notary, common modulus, low entropy, low exponent, and single key protocols. The three classes of protocol failures are: oversight of a principle applicable to a broad range of cryptoalgorithms, a weakness in the algorithm as applied to the protocol, and designer overstatement of the amount of security the protocol could provide. A two-step approach to verifying the security of a protocol consists of: identifying all assumptions in the protocol, and determining the effect on the security of the protocol if each assumption is violated.

Author: Moore, Judy H.
Publisher: Institute of Electrical and Electronics Engineers, Inc.
Publication Name: Proceedings of the IEEE
Subject: Electronics
ISSN: 0018-9219
Year: 1988
Encryption, Data encryption, Systems analysis, Data security, Communications protocols, Performance improvement (Computers), Cryptography, Protocol, System Design, Performance Improvement, Code Breaking, Public Key Cryptosystems

User Contributions:

Comment about this article or add new information about this topic:

CAPTCHA


Ill-posed problems in early vision

Article Abstract:

The process of extracting 3-D surface properties from 2-D images generated from the original 3-D images is a general inverse optical problem in early vision, the first computational stage in computer vision, which is often ill-posed. An ill-posed early vision problem is one wherein the 2-D image contains limited information about the 3-D properties, often leading to non-unique solutions. Mathematical algorithms are described that enable the generation of generalized well-posed, well-condition solutions from ill-posed, linear, inverse data. These algorithms are applied to such problems as edge detection, computation of optical flow, surface reconstruction, shape from shading, and stereo matching. Details and equations of the inverse optical problem solutions are described.

Author: Bertero, Mario, Poggio, Tomaso A., Torre, Vincent
Publisher: Institute of Electrical and Electronics Engineers, Inc.
Publication Name: Proceedings of the IEEE
Subject: Electronics
ISSN: 0018-9219
Year: 1988
Computer vision, Industrial research, Algorithms, Problem solving, Image processing, Algorithm, Computer graphics, Three dimensional graphics, Research and Development, Applications, Three-Dimensional Graphics, Machine Vision, Two-Dimensional Graphics, Methods

User Contributions:

Comment about this article or add new information about this topic:

CAPTCHA


Facing the Headaches of Early Failures: A State-of-the Art Review of Burn-In Decisions

Article Abstract:

Burn-in testing of electronic equipment during manufacturing allows replacement of defective items by screening. Using simple calculations, it is determined that the number of failures decreases with burn-in time, so that only a few hours of burn-in are needed. Burn-in screening as applied to industrial products studies is reviewed. Case studies and mathematical models of the process are presented.

Author: Kuo, W., Kuo, Y.
Publisher: Institute of Electrical and Electronics Engineers, Inc.
Publication Name: Proceedings of the IEEE
Subject: Electronics
ISSN: 0018-9219
Year: 1983
Mathematical models, Burn-in testing, Review, Performance, Case Study

User Contributions:

Comment about this article or add new information about this topic:

CAPTCHA


Subjects list: Failure, technical
Similar abstracts:
  • Abstracts: Photovoltaic systems. Economic aspects of advanced energy technologies. Photovoltaic power generation
  • Abstracts: Lateral resonant tunneling transistors employing field-induced quantum wells and barriers. Parallel Operation of Power Transistors in Switching Amplifiers
  • Abstracts: On the block least squares adaptive digital filters realized using the fast Fourier transform. Least Squares Adaptive Antenna for Angle of Arrival Estimation
  • Abstracts: Localized wave representations of acoustic and electromagnetic radiation
  • Abstracts: CD technologies PL-6100FI: platinum stereo-to-go system. Detail driven
This website is not affiliated with document authors or copyright owners. This page is provided for informational purposes only. Unintentional errors are possible.
Some parts © 2025 Advameg, Inc.