Sciweavers

368 search results - page 46 / 74
» Computation of Cryptographic Keys from Face Biometrics
Sort
View
ICCV
2005
IEEE
14 years 1 months ago
Learning Effective Image Metrics from Few Pairwise Examples
We present a new approach to learning image metrics. The main advantage of our method lies in a formulation that requires only a few pairwise examples. Apparently, based on the li...
Hwann-Tzong Chen, Tyng-Luh Liu, Chiou-Shann Fuh
HCI
2009
13 years 5 months ago
People-Oriented Programming: From Agent-Oriented Analysis to the Design of Interactive Systems
Where the Object-Oriented paradigm set about abstracting objects, iented (AO) theory draws on Psychology to abstract mentalist notions like: beliefs, perceptions, goals, and intent...
Steve Goschnick
CCGRID
2004
IEEE
13 years 11 months ago
A hardware-secured credential repository for Grid PKIs
Public Key Infrastructures suffer from usability and security problems associated with the request for and secure management of end user credentials. Online credential repositorie...
Markus Lorch, Jim Basney, Dennis G. Kafura
EMMCVPR
2007
Springer
13 years 11 months ago
An Automatic Portrait System Based on And-Or Graph Representation
Abstract. In this paper, we present an automatic human portrait system based on the And-Or graph representation. The system can automatically generate a set of life-like portraits ...
Feng Min, Jin-Li Suo, Song Chun Zhu, Nong Sang
IACR
2011
86views more  IACR 2011»
12 years 7 months ago
Protecting Drive Encryption Systems Against Memory Attacks
Software drive encryption systems are vulnerable to memory attacks, in which an attacker gains physical accesses to the unattended computer, obtains the decryption keys from memor...
Leo Dorrendorf