Sciweavers

24529 search results - page 60 / 4906
» Computing on Authenticated Data
Sort
View
VISUALIZATION
1995
IEEE
14 years 1 months ago
Authenticity Analysis of Wavelet Approximations in Visualization
Wavelet transforms include data decompositions and reconstructions. This paper is concerned with the authenticity issues of the data decomposition, particularly for data visualiza...
Pak Chung Wong, R. Daniel Bergeron
IDTRUST
2010
ACM
14 years 2 months ago
Federated login to TeraGrid
We present a new federated login capability for the TeraGrid, currently the world’s largest and most comprehensive distributed cyberinfrastructure for open scientific research....
Jim Basney, Terry Fleury, Von Welch
DAC
2009
ACM
13 years 7 months ago
A physical unclonable function defined using power distribution system equivalent resistance variations
For hardware security applications, the availability of secret keys is a critical component for secure activation, IC authentication and for other important applications including...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic
CLUSTER
2002
IEEE
14 years 2 months ago
User-Level Remote Data Access in Overlay Metacomputers
A practical problem faced by users of metacomputers and computational grids is: If my computation can move from one system to another, how can I ensure that my data will still be ...
Jeff Siegel, Paul Lu
ICMI
2009
Springer
132views Biometrics» more  ICMI 2009»
14 years 4 months ago
Activity-aware ECG-based patient authentication for remote health monitoring
Mobile medical sensors promise to provide an efficient, accurate, and economic way to monitor patients’ health outside the hospital. Patient authentication is a necessary secur...
Janani C. Sriram, Minho Shin, Tanzeem Choudhury, D...