Sciweavers

368 search results - page 25 / 74
» Computation of Cryptographic Keys from Face Biometrics
Sort
View
TRUST
2010
Springer
14 years 20 days ago
Token-Based Cloud Computing
Secure outsourcing of computation to an untrusted (cloud) service provider is becoming more and more important. Pure cryptographic solutions based on fully homomorphic and verifia...
Ahmad-Reza Sadeghi, Thomas Schneider 0003, Marcel ...
FGR
2011
IEEE
241views Biometrics» more  FGR 2011»
12 years 11 months ago
Emotion recognition from an ensemble of features
— This work details the authors’ efforts to push the baseline of expression recognition performance on a realistic database. Both subject-dependent and subject-independent emot...
Usman Tariq, Kai-Hsiang Lin, Zhen Li, Xi Zhou, Zha...
FGR
2011
IEEE
247views Biometrics» more  FGR 2011»
12 years 11 months ago
Segment and recognize expression phase by fusion of motion area and neutral divergence features
—An expression can be approximated by a sequence of temporal segments called neutral, onset, offset and apex. However, it is not easy to accurately detect such temporal segments ...
Shizhi Chen, YingLi Tian, Qingshan Liu, Dimitris N...
ICCAD
2000
IEEE
110views Hardware» more  ICCAD 2000»
14 years 1 days ago
Computing Phase Noise Eigenfunctions Directly from Steady-State Jacobian Matrices
The main effort in oscillator phase noise calculation lies in computing a vector function called the Perturbation Projection Vector (PPV). Current techniques for PPV calculation u...
Alper Demir, David E. Long, Jaijeet S. Roychowdhur...
ICSAP
2010
13 years 4 months ago
Enhanced Cost Effective Symmetric Key Algorithm for Small Amount of Data
Security being the major concern during data transfers, we have various challenges to face. The requirements of the security model vary depending on the type of data to be encrypte...
R. Satheesh Kumar, E. Pradeep, K. Naveen, R. Gunas...