Sciweavers

457 search results - page 73 / 92
» An Iris Biometric System for Public and Personal Use
Sort
View
CRYPTO
2006
Springer
112views Cryptology» more  CRYPTO 2006»
14 years 14 days ago
On Signatures of Knowledge
In a traditional signature scheme, a signature on a message m is issued under a public key PK, and can be interpreted as follows: "The owner of the public key PK and its corr...
Melissa Chase, Anna Lysyanskaya
HICSS
2003
IEEE
125views Biometrics» more  HICSS 2003»
14 years 2 months ago
Applying a Layered Policy Model to IP Based Voice Services
Traditionally, specific telecommunications services were essentially confined to certain types of networks; e.g., television over broadcast networks or cable and voice service ove...
Douglas C. Sicker
FGR
2002
IEEE
197views Biometrics» more  FGR 2002»
14 years 1 months ago
Robust Full-Motion Recovery of Head by Dynamic Templates and Re-Registration Techniques
This paper presents a method to recover the full-motion (3 rotations and 3 translations) of the head from an input video using a cylindrical head model. Given an initial reference...
Jing Xiao, Takeo Kanade, Jeffrey F. Cohn
EDBTW
2010
Springer
14 years 3 months ago
Key escrow schemes with sliding window for privacy-aware anomaly detection system
Requirements for a traffic monitoring system can be very demanding as both privacy and performance aspects have to be taken into account jointly. Moreover, the legislation sets fo...
Esa Hyytiä, Ivan Gojmerac, Simone Teofili, Gi...
RE
2001
Springer
14 years 1 months ago
The Role of Policy and Stakeholder Privacy Values in Requirements Engineering
Diverse uses of information technology (IT) in organizations affect privacy. Developers of electronic commerce, database management, security mechanisms, telecommunication and col...
Annie I. Antón, Julia Brande Earp, Thomas A...