Sciweavers

485 search results - page 20 / 97
» Continuous Spatial Authentication
Sort
View
CSREASAM
2006
13 years 9 months ago
Efficient and Secure Authentication Protocols for Mobile VoIP Communications
Mobile Voice over IP (Mobile VoIP) allows mobile users to continuously talk with each others while roaming across different networks. In such wireless application, it is vulnerabl...
Huang-Ju Chen, Jyh-Ming Huang, Lei Wang
DBSEC
2000
153views Database» more  DBSEC 2000»
13 years 9 months ago
Protecting Privacy from Continuous High-resolution Satellite Surveillance
Privacy refers to controlling the dissemination and use of personal data, including information that is knowingly disclosed, as well as data that are unintentionally revealed as a ...
Soon Ae Chun, Vijayalakshmi Atluri
GIS
2010
ACM
13 years 6 months ago
Verifying spatial queries using Voronoi neighbors
With the popularity of location-based services and the abundant usage of smart phones and GPS enabled devices, the necessity of outsourcing spatial data has grown rapidly over the...
Ling Hu, Wei-Shinn Ku, Spiridon Bakiras, Cyrus Sha...
UIST
2010
ACM
13 years 5 months ago
The IR ring: authenticating users' touches on a multi-touch display
Multi-touch displays are particularly attractive for collaborative work because multiple users can interact with applications simultaneously. However, unfettered access can lead t...
Volker Roth, Philipp Schmidt, Benjamin Gülden...
CVPR
2010
IEEE
13 years 10 months ago
A Study on Continuous Max-Flow and Min-Cut Approaches
Abstract. This work addresses a class of total-variation based multilabeling problems over a spatially continuous image domain, where the data fidelity term can be any bounded fun...
Jing Yuan, Egil Bae, Xuecheng Tai