Sciweavers

1150 search results - page 134 / 230
» Beacon Based Authentication
Sort
View
CNSR
2010
IEEE
145views Communications» more  CNSR 2010»
14 years 24 days ago
Securing the Communications of Home Health Care Systems Based on RFID Sensor Networks
We address security solutions to protect the communication of the wireless components of a home health care system. We analyze especially the problem of exchanging secrets to sati...
Wiem Tounsi, Joaquín García-Alfaro, ...
INFORMATICALT
2007
112views more  INFORMATICALT 2007»
13 years 8 months ago
Look-up Table Based Reversible Data Hiding for Error Diffused Halftone Images
This paper proposes a reversible data hiding method for error diffused halftone images. It employs statistics feature of pixel block patterns to embed data, and utilizes the HVS ch...
Jeng-Shyang Pan, Hao Luo, Zhe-Ming Lu
DKE
1998
87views more  DKE 1998»
13 years 8 months ago
Using Natural Language Sources in Model-Based Knowledge Acquisition
This paper introduces a well defined co-operation between domain expert, knowledge engineer, and knowledge acquisition and transformation tools. First, the domain expert supported...
Gabriele Schmidt, Thomas Wetter
INFORMATICALT
2010
131views more  INFORMATICALT 2010»
13 years 7 months ago
Extended Software Architecture Based on Security Patterns
One of the major activities in software design is defining software architecture. Before designing software structure and software behavior we have to define its architecture. In...
Dusan Savic, Dejan Simic, Sinisa Vlajic
ICMCS
2009
IEEE
151views Multimedia» more  ICMCS 2009»
13 years 6 months ago
Anonymous Biometric Access Control based on homomorphic encryption
In this paper, we consider the problem of incorporating privacy protection in a biometric access control system. An Anonymous Biometric Access Control (ABAC) system is proposed to...
Ying Luo, Sen-Ching S. Cheung, Shuiming Ye