Sciweavers

1663 search results - page 108 / 333
» Computer Security in the Real World
Sort
View
181
Voted
DEXAW
2007
IEEE
199views Database» more  DEXAW 2007»
15 years 7 months ago
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security
A number of factors, such as the increasing popularity of wireless networks, the opportunities offered by 3G services, and the rapid proliferation of mobile devices, have stimulat...
Esther Palomar, Juan M. Estévez-Tapiador, J...
108
Voted
ICPR
2006
IEEE
16 years 4 months ago
GMM-based SVM for face recognition
A new face recognition algorithm is presented. It supposes that a video sequence of a person is available both at enrollment and test time. During enrollment, a client Gaussian Mi...
Gérard Chollet, Hervé Bredin, Najim ...
123
Voted
EUROCRYPT
2001
Springer
15 years 8 months ago
How to Convert the Flavor of a Quantum Bit Commitment
In this paper we show how to convert a statistically binding but computationally concealing quantum bit commitment scheme into a computationally binding but statistically concealin...
Claude Crépeau, Frédéric L&ea...
134
Voted
CSCW
2012
ACM
13 years 11 months ago
The personality of popular facebook users
We study the relationship between Facebook popularity (number of contacts) and personality traits on a large number of subjects. We test to which extent two prevalent viewpoints h...
Daniele Quercia, Renaud Lambiotte, David Stillwell...
136
Voted
MM
2006
ACM
157views Multimedia» more  MM 2006»
15 years 9 months ago
Cyborglogging with camera phones: steps toward equiveillance
We present “equiveillance” as a conceptual framework for understanding the balance between surveillance and sousveillance. In addition to this conceptual framework we also pre...
Steve Mann, James Fung, Raymond Lo