Sciweavers

780 search results - page 42 / 156
» A New Identification Scheme Based on the Perceptrons Problem
Sort
View
CIS
2007
Springer
14 years 2 months ago
A New Provably Secure Authentication and Key Agreement Mechanism for SIP Using Certificateless Public-Key Cryptography
The session initiation protocol (SIP) is considered as the dominant signaling protocol for calls over the internet. However, SIP authentication typically uses HTTP digest authentic...
Fengjiao Wang, Yuqing Zhang
INFOCOM
2010
IEEE
13 years 6 months ago
Towards Reliable Scheduling Schemes for Long-lived Replaceable Sensor Networks
—To address energy constraint problem in sensor networks, node reclamation and replacement strategy has been proposed for networks accessible to human beings and robots. The majo...
Bin Tong, Zi Li, Guiling Wang, Wensheng Zhang
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
13 years 5 months ago
A DAA Scheme Requiring Less TPM Resources
Abstract. Direct anonymous attestation (DAA) is a special digital signature primitive, which provides a balance between signer authentication and privacy. One of the most interesti...
Liqun Chen
CVPR
2012
IEEE
11 years 10 months ago
A new mirror-based extrinsic camera calibration using an orthogonality constraint
This paper is aimed at calibrating the relative posture and position, i.e. extrinsic parameters, of a stationary camera against a 3D reference object which is not directly visible...
Kosuke Takahashi, Shohei Nobuhara, Takashi Matsuya...
GECCO
2004
Springer
126views Optimization» more  GECCO 2004»
14 years 1 months ago
A Gene Based Adaptive Mutation Strategy for Genetic Algorithms
In this study, a new mechanism that adapts the mutation rate for each locus on the chromosomes, based on feedback obtained from the current population is proposed. Through tests us...
Sima Uyar, Sanem Sariel, Gülsen Eryigit