Sciweavers

368 search results - page 36 / 74
» Computation of Cryptographic Keys from Face Biometrics
Sort
View
HICSS
2010
IEEE
130views Biometrics» more  HICSS 2010»
14 years 2 months ago
On the Reliability of Software Piracy Statistics
Despite tremendous debate and policy interest in software piracy, the accuracy of piracy statistics compiled by the Business Software Alliance (BSA) has been accepted at face valu...
Ivan P. L. Png
CLEAR
2007
Springer
178views Biometrics» more  CLEAR 2007»
14 years 1 months ago
The CLEAR 2007 Evaluation
This paper is a summary of the 2007 CLEAR Evaluation on the Classification of Events, Activities, and Relationships which took place in early 2007 and culminated with a two-day wo...
Rainer Stiefelhagen, Keni Bernardin, Rachel Bowers...
ACIVS
2007
Springer
14 years 1 months ago
Spatiotemporal Fusion Framework for Multi-camera Face Orientation Analysis
In this paper, we propose a collaborative technique for face orientation estimation in smart camera networks. The proposed spatiotemporal feature fusion analysis is based on active...
Chung-Ching Chang, Hamid K. Aghajan
IJNSEC
2007
137views more  IJNSEC 2007»
13 years 7 months ago
An FPGA-based AES-CCM Crypto Core For IEEE 802.11i Architecture
The widespread adoption of IEEE 802.11 wireless networks has brought its security paradigm under active research. One of the important research areas in this field is the realiza...
Arshad Aziz, Nassar Ikram
HICSS
2003
IEEE
153views Biometrics» more  HICSS 2003»
14 years 27 days ago
Balancing Safety Against Performance: Tradeoffs in Internet Security
All Internet-accessible computing systems are currently faced with incessant threats ranging from simple scriptkiddies to highly sophisticated criminal enterprises. In response to...
Vu A. Ha, David J. Musliner