Sciweavers

76 search results - page 9 / 16
» Certification and Authentication of Data Structures
Sort
View
IFIP
2010
Springer
13 years 4 months ago
Secrecy and Authenticity Types for Secure Distributed Messaging
Abstract. We introduce a calculus with mobile names, distributed principals and primitives for secure remote communication, without any reference to explicit cryptography. The calc...
Michele Bugliesi, Stefano Calzavara, Damiano Maced...
CIKM
2005
Springer
14 years 3 months ago
A robot ontology for urban search and rescue
The goal of this Robot Ontology effort is to develop and begin to populate a neutral knowledge representation (the data structures) capturing relevant information about robots and...
Craig Schlenoff, Elena Messina
ICPR
2006
IEEE
14 years 10 months ago
Motion Features from Lip Movement for Person Authentication
This paper describes a new motion based feature extraction technique for speaker identification using orientation estimation in 2D manifolds. The motion is estimated by computing ...
Josef Bigün, Maycel Isaac Faraj
SICHERHEIT
2008
13 years 11 months ago
A Cryptographic Biometric Authentication System based on Genetic Fingerprints
We specify a system for authentication and key derivation using genetic fingerprints which prevents the recovery of biometric information from data stored for verification. We pre...
Ulrike Korte, Michael Krawczak, Johannes Merkle, R...
ICDE
2008
IEEE
157views Database» more  ICDE 2008»
14 years 11 months ago
Spatial Outsourcing for Location-based Services
- The embedding of positioning capabilities in mobile devices and the emergence of location-based applications have created novel opportunities for utilizing several types of multi...
Yin Yang, Stavros Papadopoulos, Dimitris Papadias,...