Sciweavers

368 search results - page 51 / 74
» Computation of Cryptographic Keys from Face Biometrics
Sort
View
TIT
2011
125views more  TIT 2011»
13 years 2 months ago
Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption
Abstract. In 1998, Blaze, Bleumer, and Strauss proposed a cryptographic primitive called proxy re-encryption, in which a proxy transforms – without seeing the corresponding plain...
Benoît Libert, Damien Vergnaud
HICSS
2007
IEEE
141views Biometrics» more  HICSS 2007»
14 years 1 months ago
Modular Integration Through Aspects: Making Cents of Legacy Systems
Recently, Continua Health Alliance has brought together a powerhouse team, including Cisco, IBM, Motorola and others, for personal telehealth products and services. This team will...
Celina Gibbs, Daniel Lohmann, Chunjian Robin Liu, ...
ICCV
2007
IEEE
14 years 1 months ago
Pose and Gaze Estimation in Multi-camera Networks for Non-restrictive HCI
Multi-camera networks offer potentials for a variety of novel human-centric applications through provisioning of rich visual information. In this paper, face orientation analysis ...
Chung-Ching Chang, Chen Wu, Hamid K. Aghajan
ICDCS
2006
IEEE
14 years 1 months ago
Fast data access over asymmetric channels using fair and secure bandwidth sharing
We propose a peer-to-peer architecture designed to overcome asymmetries in upload/download speeds that are typical in end-user dialup, broadband and cellular wireless Internet con...
Sachin Agarwal, Moshe Laifenfeld, Ari Trachtenberg...
ICMI
2005
Springer
201views Biometrics» more  ICMI 2005»
14 years 1 months ago
A joint particle filter for audio-visual speaker tracking
In this paper, we present a novel approach for tracking a lecturer during the course of his speech. We use features from multiple cameras and microphones, and process them in a jo...
Kai Nickel, Tobias Gehrig, Rainer Stiefelhagen, Jo...