Sciweavers

24529 search results - page 143 / 4906
» Computing on Authenticated Data
Sort
View
122
Voted
WICON
2008
15 years 4 months ago
Security challenges in seamless mobility: how to "handover" the keys?
In this paper, we discuss key management challenges for seamless handovers across heterogeneous wireless networks. We focus on utilizing existing keying material from previous acc...
Katrin Hoeper, Lidong Chen, Antonio Izquierdo, Nad...
JSAC
2006
127views more  JSAC 2006»
15 years 2 months ago
Location-based compromise-tolerant security mechanisms for wireless sensor networks
Abstract-- Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose ...
Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang
135
Voted
TOG
2012
160views Communications» more  TOG 2012»
13 years 5 months ago
Highlight microdisparity for improved gloss depiction
Human stereo perception of glossy materials is substantially different from the perception of diffuse surfaces: A single point on a diffuse object appears the same for both eyes, ...
Krzysztof Templin, Piotr Didyk, Tobias Ritschel, K...
116
Voted
ICB
2009
Springer
185views Biometrics» more  ICB 2009»
15 years 9 months ago
Pose Invariant Palmprint Recognition
Abstract. A palmprint based authentication system that can work with a multipurpose camera in uncontrolled circumstances, such as those mounted on a laptop, mobile device or those ...
Chhaya Methani, Anoop M. Namboodiri