Sciweavers

24529 search results - page 92 / 4906
» Computing on Authenticated Data
Sort
View
AINA
2006
IEEE
14 years 1 months ago
Efficient Authentication for Reactive Routing Protocols
Ad hoc networks are dynamic networks formed "on the fly" by a set of nodes. Achieving secure routing in such networks is a big challenge. Asymmetric signature schemes pr...
Raghav Bhaskar, Javier Herranz, Fabien Laguillaumi...
ICIAR
2004
Springer
14 years 3 months ago
Environment Authentication Through 3D Structural Analysis
Abstract. We address the validation of the current sensed environmental state against a model known from earlier perception. Our surface based approach compares 3D range data of a ...
Toby P. Breckon, Robert B. Fisher
HPDC
2002
IEEE
14 years 3 months ago
Flexibility, Manageability, and Performance in a Grid Storage Appliance
We present NeST, a flexible software-only storage appliance designed to meet the storage needs of the Grid. NeST has three key features that make it well-suited for deployment in...
John Bent, Venkateshwaran Venkataramani, Nick LeRo...
ICPR
2006
IEEE
14 years 4 months ago
Combining Fingerprint, Palmprint and Hand-Shape for User Authentication
This paper investigates a new approach for personal authentication by combining unique biometric features which can be acquired from hand images alone. The proposed method attempt...
Ajay Kumar, David Zhang
AMDO
2006
Springer
14 years 1 months ago
Automatic Pose Correction for Local Feature-Based Face Authentication
In this paper, we present an automatic face authentication system. Accurate segmentation of prominent facial features is accomplished by means of an extension of the Active Shape M...
Daniel González-Jiménez, Federico Su...