Sciweavers

368 search results - page 55 / 74
» Computation of Cryptographic Keys from Face Biometrics
Sort
View
ACMICEC
2003
ACM
144views ECommerce» more  ACMICEC 2003»
14 years 23 days ago
Security model for a multi-agent marketplace
A multi-agent marketplace, MAGNET (Multi AGent Negotiation Testbed), is a promising solution to conduct online combinatorial auctions. The trust model of MAGNET is somewhat diffe...
Ashutosh Jaiswal, Yongdae Kim, Maria L. Gini
EUROCRYPT
2001
Springer
14 years 2 hour ago
Evidence that XTR Is More Secure than Supersingular Elliptic Curve Cryptosystems
Abstract. We show that finding an efficiently computable injective homomorphism from the XTR subgroup into the group of points over GF(p2 ) of a particular type of supersingular e...
Eric R. Verheul
ATC
2009
Springer
13 years 11 months ago
SAConf: Semantic Attestation of Software Configurations
Remote attestation is one of the key functionalities provided by trusted platforms. Most current attestation approaches are based on cryptographic hash functions, which are appropr...
Hua Wang, Yao Guo, Xiangqun Chen
ICMI
2003
Springer
184views Biometrics» more  ICMI 2003»
14 years 21 days ago
Real time facial expression recognition in video using support vector machines
Enabling computer systems to recognize facial expressions and infer emotions from them in real time presents a challenging research topic. In this paper, we present a real time ap...
Philipp Michel, Rana El Kaliouby
CLADE
2004
IEEE
13 years 11 months ago
Support for Data-Intensive, Variable-Granularity Grid Applications via Distributed File System Virtualization - A Case Study of
A key challenge faced by large-scale, distributed applications in Grid environments is efficient, seamless data management. In particular, for applications that can benefit from a...
Jithendar Paladugula, Ming Zhao 0002, Renato J. O....