Sciweavers

1663 search results - page 108 / 333
» Computer Security in the Real World
Sort
View
DEXAW
2007
IEEE
199views Database» more  DEXAW 2007»
14 years 2 months ago
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security
A number of factors, such as the increasing popularity of wireless networks, the opportunities offered by 3G services, and the rapid proliferation of mobile devices, have stimulat...
Esther Palomar, Juan M. Estévez-Tapiador, J...
ICPR
2006
IEEE
14 years 11 months ago
GMM-based SVM for face recognition
A new face recognition algorithm is presented. It supposes that a video sequence of a person is available both at enrollment and test time. During enrollment, a client Gaussian Mi...
Gérard Chollet, Hervé Bredin, Najim ...
EUROCRYPT
2001
Springer
14 years 2 months ago
How to Convert the Flavor of a Quantum Bit Commitment
In this paper we show how to convert a statistically binding but computationally concealing quantum bit commitment scheme into a computationally binding but statistically concealin...
Claude Crépeau, Frédéric L&ea...
CSCW
2012
ACM
12 years 5 months ago
The personality of popular facebook users
We study the relationship between Facebook popularity (number of contacts) and personality traits on a large number of subjects. We test to which extent two prevalent viewpoints h...
Daniele Quercia, Renaud Lambiotte, David Stillwell...
MM
2006
ACM
157views Multimedia» more  MM 2006»
14 years 4 months ago
Cyborglogging with camera phones: steps toward equiveillance
We present “equiveillance” as a conceptual framework for understanding the balance between surveillance and sousveillance. In addition to this conceptual framework we also pre...
Steve Mann, James Fung, Raymond Lo