Sciweavers

1150 search results - page 193 / 230
» Beacon Based Authentication
Sort
View
CLUSTER
2006
IEEE
13 years 8 months ago
Distributed File System Virtualization Techniques Supporting On-Demand Virtual Machine Environments for Grid Computing
This paper presents a data management solution which allows fast Virtual Machine (VM) instantiation and efficient run-time execution to support VMs as execution environments in Gri...
Ming Zhao 0002, Jian Zhang 0005, Renato J. O. Figu...
CORR
2006
Springer
82views Education» more  CORR 2006»
13 years 8 months ago
Explicit Randomness is not Necessary when Modeling Probabilistic Encryption
Although good encryption functions are probabilistic, most symbolic models do not capture this aspect explicitly. A typical solution, recently used to prove the soundness of such ...
Véronique Cortier, Heinrich Hördegen, ...
JCP
2008
216views more  JCP 2008»
13 years 8 months ago
Direct Anonymous Attestation for Next Generation TPM
Trusted computing platforms have been proposed as a promising approach to enhance the security of general-purpose computing systems. Direct Anonymous Attestation(DAA) is a scheme t...
Xiaofeng Chen 0004, Dengguo Feng
JSAC
2006
155views more  JSAC 2006»
13 years 8 months ago
LR-AKE-Based AAA for Network Mobility (NEMO) Over Wireless Links
Network mobility introduces far more complexity than host mobility. Therefore, host mobility protocols such as Mobile IPv6 (MIPv6) need to be extended to support this new type of m...
Hanane Fathi, SeongHan Shin, Kazukuni Kobara, Shya...
PR
2008
87views more  PR 2008»
13 years 8 months ago
Two-dimensional Laplacianfaces method for face recognition
In this paper we propose a two-dimensional (2D) Laplacianfaces method for face recognition. The new algorithm is developed based on two techniques, i.e., locality preserved embedd...
Ben Niu, Qiang Yang, Simon Chi-Keung Shiu, Sankar ...