Sciweavers

368 search results - page 56 / 74
» Computation of Cryptographic Keys from Face Biometrics
Sort
View
ADS
2004
Springer
13 years 11 months ago
Neural Architecture for Temporal Emotion Classification
Abstract. In this pilot study, a neural architecture for temporal emotion recognition from image sequences is proposed. The investigation aims at the development of key principles ...
Roland Schweiger, Pierre Bayerl, Heiko Neumann
SP
2006
IEEE
193views Security Privacy» more  SP 2006»
14 years 1 months ago
Analysis of the Linux Random Number Generator
Linux is the most popular open source project. The Linux random number generator is part of the kernel of all Linux distributions and is based on generating randomness from entrop...
Zvi Gutterman, Benny Pinkas, Tzachy Reinman
CIS
2004
Springer
14 years 27 days ago
Fast Query Over Encrypted Character Data in Database
There are a lot of very important data in database, which need to be protected from attacking. Cryptographic support is an important mechanism of securing them. People, however, mu...
Zheng-Fei Wang, Jing Dai, Wei Wang 0009, Baile Shi
ASIACRYPT
2000
Springer
13 years 12 months ago
Distributed Oblivious Transfer
The mobile agent is a fundamental building block of the mobile computing paradigm. In mobile agent security, oblivious transfer (OT) from a trusted party can be used to protect th...
Moni Naor, Benny Pinkas
ICISC
2001
162views Cryptology» more  ICISC 2001»
13 years 9 months ago
Content Extraction Signatures
Motivated by emerging needs in online interactions, we define a new type of digital signature called a `Content Extraction Signature' (CES). A CES allows the owner, Bob, of a...
Ron Steinfeld, Laurence Bull, Yuliang Zheng