Sciweavers

138 search results - page 19 / 28
» A Proposal of Short Proxy Signature using Pairing
Sort
View
HICSS
2007
IEEE
112views Biometrics» more  HICSS 2007»
14 years 1 months ago
E-Risk Management through Self Insurance: An Option Model
e-business organizations are under constant threat of their business being disrupted by hackers, viruses and a host of malicious attackers. This would lead to loses to the tune of...
Arunabha Mukhopadhyay, Binay Bhushan, Debashis Sah...
CISS
2008
IEEE
14 years 1 months ago
Interference management for multiuser two-way relaying
—We consider a multiuser two-way relay network where multiple pairs of users communicate with their pre-assigned partners, using a common intermediate relay node, in a twophase c...
Min Chen, Aylin Yener
CRYPTO
2003
Springer
132views Cryptology» more  CRYPTO 2003»
13 years 12 months ago
On Cryptographic Assumptions and Challenges
We deal with computational assumptions needed in order to design secure cryptographic schemes. We suggest a classi£cation of such assumptions based on the complexity of falsifying...
Moni Naor
AVBPA
2005
Springer
296views Biometrics» more  AVBPA 2005»
14 years 6 days ago
Exploring Similarity Measures for Biometric Databases
Currently biometric system performance is evaluated in terms of its FAR and FRR. The accuracy expressed in such a manner depends on the characteristics of the dataset on which the ...
Praveer Mansukhani, Venu Govindaraju
ICASSP
2010
IEEE
13 years 7 months ago
Tracking encrypted VoIP calls via robust hashing of network flows
In this work we propose a Voice over IP (VoIP) call tracking scheme based on robust hashing of VoIP flows. In the proposed scheme the audio content of a possibly encrypted VoIP ï...
Baris Coskun, Nasir D. Memon