Sciweavers

790 search results - page 77 / 158
» Designated Confirmer Signatures
Sort
View
HICSS
2010
IEEE
276views Biometrics» more  HICSS 2010»
15 years 10 months ago
Effects of Wi-Fi and Bluetooth Battery Exhaustion Attacks on Mobile Devices
This paper provides insight into the ramifications of battery exhaustion Denial of Service (DoS) attacks on battery-powered mobile devices. Several IEEE 802.11 Wi-Fi, IEEE 802.15....
Benjamin R. Moyers, John Paul Dunning, Randolph Ma...
124
Voted
ICASSP
2009
IEEE
15 years 10 months ago
LSH banding for large-scale retrieval with memory and recall constraints
Locality Sensitive Hashing (LSH) is widely used for efficient retrieval of candidate matches in very large audio, video, and image systems. However, extremely large reference dat...
Michele Covell, Shumeet Baluja
118
Voted
HICSS
2005
IEEE
127views Biometrics» more  HICSS 2005»
15 years 9 months ago
Enterprise Architecture Analysis with XML
This paper shows how XML can be used for static and dynamic analysis of architectures. Our analysis is based on the distinction between symbolic and semantic models of architectur...
Frank S. de Boer, Marcello M. Bonsangue, Joost Jac...
129
Voted
GI
2005
Springer
15 years 9 months ago
Security Extensions to MMARP Through Cryptographically Generated Addresses
: The MMARP protocol provides multicast routing in hybrid environments in which an ad hoc network is connected to the Internet. As many other routing protocols it was initially des...
Francisco J. Galera, Pedro M. Ruiz, Antonio F. G&o...
150
Voted
AVBPA
2005
Springer
296views Biometrics» more  AVBPA 2005»
15 years 9 months ago
Exploring Similarity Measures for Biometric Databases
Currently biometric system performance is evaluated in terms of its FAR and FRR. The accuracy expressed in such a manner depends on the characteristics of the dataset on which the ...
Praveer Mansukhani, Venu Govindaraju