Sciweavers

155 search results - page 8 / 31
» Flexible Aliasing with Protection
Sort
View
IJNSEC
2008
145views more  IJNSEC 2008»
13 years 7 months ago
Efficient User Authentication and Key Agreement with User Privacy Protection
Using smart cards, remote user authentication and key agreement can be simplified, flexible, and efficient for creating a secure distributed computers environment. Addition to use...
Wen-Shenq Juang, Jing-Lin Wu
ICIP
2008
IEEE
14 years 2 months ago
H.264/AVC video scrambling for privacy protection
In this paper, we address the problem of privacy in video surveillance systems. More specifically, we consider the case of H.264/AVC which is the state-of-the-art in video coding....
Frédéric Dufaux, Touradj Ebrahimi
ICML
2005
IEEE
14 years 8 months ago
Interactive learning of mappings from visual percepts to actions
We introduce flexible algorithms that can automatically learn mappings from images to actions by interacting with their environment. They work by introducing an image classifier i...
Justus H. Piater, Sébastien Jodogne
ICMCS
2005
IEEE
110views Multimedia» more  ICMCS 2005»
14 years 1 months ago
License management scheme with anonymous trust for digital rights management
One of the major issues raised by Digital Rights Management systems concerns the protection of the user’s privacy and anonymous consumption of content. However, most existing li...
Jiang Zhang, Bin Li, Li Zhao, Shi-Qiang Yang
ICPADS
2006
IEEE
14 years 1 months ago
Flexible, Low-overhead Event Logging to Support Resource Scheduling
Flexible resource management and scheduling policies require detailed system-state information. Traditional, monolithic operating systems with a centralized kernel derive the requ...
Jan Stoess, Volkmar Uhlig