Sciweavers

92 search results - page 15 / 19
» Hidden Identity-Based Signatures
Sort
View
DIM
2005
ACM
13 years 9 months ago
Pseudonym management using mediated identity-based cryptography
Mobile Location-Based Services (LBS) have raised privacy concerns amongst mobile phone users who may need to supply their identity and location information to untrustworthy third ...
Thibault Candebat, Cameron Ross Dunne, David T. Gr...
ICPR
2006
IEEE
14 years 8 months ago
Activity Discovery from Surveillance Videos
Multi-agent interactions often result in mutual occlusion sequences which constitute a visual signature for the event. We define six qualitative occlusion primitives based on the ...
Amitabha Mukerjee, K. S. Venkatesh, Pabitra Mitra,...
FC
2005
Springer
110views Cryptology» more  FC 2005»
14 years 1 months ago
A Privacy-Protecting Coupon System
A coupon represents the right to claim some service which is typically offered by vendors. In practice, issuing bundled multi-coupons is more efficient than issuing single coupons...
Liqun Chen, Matthias Enzmann, Ahmad-Reza Sadeghi, ...
SSPR
2004
Springer
14 years 24 days ago
Learning People Movement Model from Multiple Cameras for Behaviour Recognition
Abstract. In surveillance systems for monitoring people behaviour, it is imporant to build systems that can adapt to the signatures of the people tasks and movements in the environ...
Nam Thanh Nguyen, Svetha Venkatesh, Geoff A. W. We...
DMIN
2006
141views Data Mining» more  DMIN 2006»
13 years 8 months ago
Extracting Forensic Explanation from Intrusion Alerts
Since it is desirable for an intrusion detection system to be operated with the real time performance, it is not unusual for an intrusion detection engine to perform a "lazy ...
Bon Sy, Negmat Mullodzhanov