Sciweavers

24529 search results - page 104 / 4906
» Computing on Authenticated Data
Sort
View
ICPR
2006
IEEE
16 years 3 months ago
Pose Correction and Subject-Specific Features for Face Authentication
In this paper, we present a face authentication system that can be broken down in three stages. Prior to feature extraction, a pose correction step is applied, so that frontal fac...
Daniel González-Jiménez, José...
ICCSA
2009
Springer
15 years 9 months ago
On a Construction of Short Digests for Authenticating Ad Hoc Networks
In pervasive ad-hoc networks, there is a need for devices to be able to communicate securely, despite the lack of apriori shared security associations and the absence of an infrast...
Khoongming Khoo, Ford-Long Wong, Chu-Wee Lim
AINA
2005
IEEE
15 years 8 months ago
Authenticated Encryption Schemes with Message Linkage for Threshold Signatures
Based on the factorization problem, a modified (t, n) threshold group-oriented scheme with message recovery is proposed. In the proposed scheme, any combination of more than t mem...
Chi-Hsiung Huang, Chia-Yin Lee, Chu-Hsing Lin, Chi...
CHI
2007
ACM
15 years 6 months ago
Education, entertainment and authenticity: lessons learned from designing an interactive exhibit about medieval music
In this paper we describe the design experience gathered from creating an interactive exhibit about medieval music. This system was designed as an educational exhibit that relies ...
Marius Wolf, Eric Lee, Jan Borchers
JCP
2007
117views more  JCP 2007»
15 years 2 months ago
Internet Research Support System: An Application for Immediate Feedback in Authentic Internet Research
– A prototype Internet Research Support System is presented based on earlier work on the modeling of online reading behavior and evaluating the reading process and its outcomes. ...
Nasiroh Omar, Colin Higgins, Colin G. Harrison, Di...