Sciweavers

828 search results - page 12 / 166
» A Network Coding Approach to Secret Key Distribution
Sort
View
ESORICS
2004
Springer
14 years 4 months ago
Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks
Key distribution is one of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered over a hostile territory. In such a sensor dep...
Seyit Ahmet Çamtepe, Bülent Yener
ICASSP
2011
IEEE
13 years 2 months ago
A 3-layer coding scheme for biometry template protection based on spectral minutiae
—Spectral Minutiae (SM) representation enables the combination of minutiae-based fingerprint recognition systems with template protection schemes based on fuzzy commitment, but ...
Xiaoying Shao, Haiyun Xu, Raymond N. J. Veldhuis, ...
IJNSEC
2007
154views more  IJNSEC 2007»
13 years 10 months ago
Integrity of mobile agents: a new approach
The recent developments in the mobile technology (mobile phones, middleware) created a need for new methods of protecting the code transmitted through the network. The oldest and ...
Aneta Zwierko, Zbigniew Kotulski
PPSN
2004
Springer
14 years 4 months ago
Coupling of Evolution and Learning to Optimize a Hierarchical Object Recognition Model
Abstract. A key problem in designing artificial neural networks for visual object recognition tasks is the proper choice of the network architecture. Evolutionary optimization met...
Georg Schneider, Heiko Wersing, Bernhard Sendhoff,...
GLOBECOM
2006
IEEE
14 years 4 months ago
Key Distribution in Mobile Heterogeneous Sensor Networks
— Key predistribution is a popular technique for key distribution in sensor networks. The schemes available in current literature using this approach are for nodes with no or lim...
Arjan Durresi, Vijay Bulusu, Vamsi Paruchuri, Mimo...