Sciweavers

1466 search results - page 94 / 294
» Completeness of the Authentication Tests
Sort
View
INFOCOM
2009
IEEE
14 years 2 months ago
Secure Range Queries in Tiered Sensor Networks
—We envision a two-tier sensor network which consists of resource-rich master nodes at the upper tier and resourcepoor sensor nodes at the lower tier. Master nodes collect data f...
Jing Shi, Rui Zhang, Yanchao Zhang
SOUPS
2009
ACM
14 years 2 months ago
Serial hook-ups: a comparative usability study of secure device pairing methods
Secure Device Pairing is the bootstrapping of secure communication between two previously unassociated devices over a wireless channel. The human-imperceptible nature of wireless ...
Alfred Kobsa, Rahim Sonawalla, Gene Tsudik, Ersin ...
ACSAC
2008
IEEE
14 years 2 months ago
Please Permit Me: Stateless Delegated Authorization in Mashups
Mashups have emerged as a Web 2.0 phenomenon, connecting disjoint applications together to provide unified services. However, scalable access control for mashups is difficult. T...
Ragib Hasan, Marianne Winslett, Richard M. Conlan,...
ICARCV
2008
IEEE
222views Robotics» more  ICARCV 2008»
14 years 2 months ago
Robust fusion using boosting and transduction for component-based face recognition
—Face recognition performance depends upon the input variability as encountered during biometric data capture including occlusion and disguise. The challenge met in this paper is...
Fayin Li, Harry Wechsler, Massimo Tistarelli
VLDB
2007
ACM
119views Database» more  VLDB 2007»
14 years 2 months ago
Integrity Auditing of Outsourced Data
An increasing number of enterprises outsource their IT services to third parties who can offer these services for a much lower cost due to economy of scale. Quality of service is ...
Min Xie, Haixun Wang, Jian Yin, Xiaofeng Meng