Sciweavers

83 search results - page 6 / 17
» From Key Predistribution to Key Redistribution
Sort
View
CCS
2009
ACM
14 years 8 months ago
Logging key assurance indicators in business processes
Management of a modern enterprise is based on the assumption that executive reports of lower-layer management are faithful to what is actually happening in the field. As some well...
Fabio Massacci, Gene Tsudik, Artsiom Yautsiukhin
ICC
2007
IEEE
125views Communications» more  ICC 2007»
14 years 2 months ago
SFRIC: A Secure Fast Roaming Scheme in Wireless LAN Using ID-Based Cryptography
In a wireless network composed of multiple access points, a long delay during roaming from one access point to another may cause a disruption for streaming traffic. Roaming in wire...
Yoohwan Kim, Wei Ren, Ju-Yeon Jo, Yingtao Jiang, J...
CVPR
2005
IEEE
14 years 9 months ago
Vehicle Segmentation and Tracking from a Low-Angle Off-Axis Camera
We present a novel method for visually monitoring a highway when the camera is relatively low to the ground and on the side of the road. In such a case, occlusion and the perspect...
Neeraj K. Kanhere, Shrinivas J. Pundlik, Stan Birc...
ASIACRYPT
2003
Springer
14 years 27 days ago
A Traceable Block Cipher
In this paper1 we propose a new symmetric block cipher with the following paradoxical traceability properties: it is computationally easy to derive many equivalent secret keys prov...
Olivier Billet, Henri Gilbert
ICASSP
2008
IEEE
14 years 2 months ago
Gaze-contingent asr for spontaneous, conversational speech: An evaluation
There has been little work that attempts to improve the recognition of spontaneous, conversational speech by adding information from a loosely-coupled modality. This study investi...
Neil Cooke, Martin J. Russell