Sciweavers

1610 search results - page 249 / 322
» Identity Based Multisignatures
Sort
View
SAC
2005
ACM
14 years 4 months ago
Using object-level run-time metrics to study coupling between objects
In this paper we present an investigation into the run-time behaviour of objects in Java programs, using specially adapted coupling metrics. We identify objects from the same clas...
Áine Mitchell, James F. Power
SIGMOD
2005
ACM
123views Database» more  SIGMOD 2005»
14 years 4 months ago
To Do or Not To Do: The Dilemma of Disclosing Anonymized Data
Decision makers of companies often face the dilemma of whether to release data for knowledge discovery, vis a vis the risk of disclosing proprietary or sensitive information. Whil...
Laks V. S. Lakshmanan, Raymond T. Ng, Ganesh Rames...
CIVR
2005
Springer
14 years 4 months ago
Person Spotting: Video Shot Retrieval for Face Sets
Matching people based on their imaged face is hard because of the well known problems of illumination, pose, size and expression variation. Indeed these variations can exceed those...
Josef Sivic, Mark Everingham, Andrew Zisserman
CRYPTO
2005
Springer
120views Cryptology» more  CRYPTO 2005»
14 years 4 months ago
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
We identify and fill some gaps with regard to consistency (the extent to which false positives are produced) for public-key encryption with keyword search (PEKS), providing new de...
Michel Abdalla, Mihir Bellare, Dario Catalano, Eik...
CRYPTO
2005
Springer
149views Cryptology» more  CRYPTO 2005»
14 years 4 months ago
Authenticating Pervasive Devices with Human Protocols
Forgery and counterfeiting are emerging as serious security risks in low-cost pervasive computing devices. These devices lack the computational, storage, power, and communication r...
Ari Juels, Stephen A. Weis