Sciweavers

503 search results - page 20 / 101
» Authenticity by tagging and typing
Sort
View
AINA
2006
IEEE
14 years 14 days ago
EC: an edge-based architecture against DDoS attacks and malware spread
The ability to limit unsolicited traffic in the Internet is important to defy DDoS attacks and to contain the spread of worms and viruses. The concept of capabilities, which requir...
Roger Karrer
ICMCS
2006
IEEE
129views Multimedia» more  ICMCS 2006»
14 years 2 months ago
Video Based Person Authentication via Audio/Visual Association
Multi-modal person authentication systems can achieve higher performance and robustness by combining different modalities. The current fusion strategies of different modalities ar...
Ming S. Liu, Thomas S. Huang
ISW
2001
Springer
14 years 1 months ago
Persistent Authenticated Dictionaries and Their Applications
Abstract. We introduce the notion of persistent authenticated dictionaries, that is, dictionaries where the user can make queries of the type “was element e in set S at time t?â€...
Aris Anagnostopoulos, Michael T. Goodrich, Roberto...
CORR
2010
Springer
142views Education» more  CORR 2010»
13 years 8 months ago
A Fault Analytic Method against HB+
The search for lightweight authentication protocols suitable for low-cost RFID tags constitutes an active and challenging research area. In this context, a family of protocols base...
Jose Carrijo, Rafael Tonicelli, Anderson C. A. Nas...
ACL
2009
13 years 6 months ago
Word to Sentence Level Emotion Tagging for Bengali Blogs
In this paper, emotion analysis on blog texts has been carried out for a less privileged language like Bengali. Ekman's six basic emotion types have been selected for reliabl...
Dipankar Das, Sivaji Bandyopadhyay