Sciweavers

1150 search results - page 161 / 230
» Beacon Based Authentication
Sort
View
AINA
2007
IEEE
14 years 3 months ago
Agri-Food Traceability Management using a RFID System with Privacy Protection
In this paper an agri-food traceability system based on public key cryptography and Radio Frequency Identification (RFID) technology is proposed. In order to guarantee safety in f...
Paolo Bernardi, Claudio Demartini, Filippo Gandino...
ISM
2006
IEEE
88views Multimedia» more  ISM 2006»
14 years 2 months ago
Interactive Content Overviews for Lecture Recordings
Lecture recordings can be a powerful addition to traditional lectures and they can even serve as a main content source in a number of didactic scenarios. If users can quickly loca...
Robert Mertens, Markus Ketterl, Oliver Vornberger
HICSS
2003
IEEE
129views Biometrics» more  HICSS 2003»
14 years 2 months ago
Peer-to-Peer Networks for Virtual Home Environments
This paper presents au approach to extend OSGi server based home networks with JXTA’s peer-topeer (PZP) technoIogy to a mzdti-server home environment connecting multiple private...
Chris Loeser, Wolfgang Müller 0003, Frank Ber...
FC
2006
Springer
147views Cryptology» more  FC 2006»
14 years 15 days ago
Timed-Release and Key-Insulated Public Key Encryption
In this paper we consider two security notions related to Identity Based Encryption: Key-insulated public key encryption, introduced by Dodis, Katz, Xu and Yung; and Timed-Release ...
Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan...
ICMCS
2010
IEEE
171views Multimedia» more  ICMCS 2010»
13 years 10 months ago
Transforming a pattern identifier into biometric key generators
According to a popular pattern recognition method, this paper proposes two methods to generate a secret from individual's biometric information, such as fingerprint feature p...
Yongdong Wu, Bo Qiu