Wavelet transforms include data decompositions and reconstructions. This paper is concerned with the authenticity issues of the data decomposition, particularly for data visualiza...
We present a new federated login capability for the TeraGrid, currently the world’s largest and most comprehensive distributed cyberinfrastructure for open scientific research....
For hardware security applications, the availability of secret keys is a critical component for secure activation, IC authentication and for other important applications including...
A practical problem faced by users of metacomputers and computational grids is: If my computation can move from one system to another, how can I ensure that my data will still be ...
Mobile medical sensors promise to provide an efficient, accurate, and economic way to monitor patients’ health outside the hospital. Patient authentication is a necessary secur...
Janani C. Sriram, Minho Shin, Tanzeem Choudhury, D...