Sciweavers

1610 search results - page 37 / 322
» Identity Based Multisignatures
Sort
View
JCDL
2005
ACM
130views Education» more  JCDL 2005»
14 years 2 months ago
Leveraging context to resolve identity in photo albums
Our system suggests likely identity labels for photographs in a personal photo collection. Instead of using face recognition techniques, the system leverages automatically availab...
Mor Naaman, Ron B. Yeh, Hector Garcia-Molina, Andr...
WWW
2009
ACM
14 years 9 months ago
A hybrid phish detection approach by identity discovery and keywords retrieval
Phishing is a significant security threat to the Internet, which causes tremendous economic loss every year. In this paper, we proposed a novel hybrid phish detection method based...
Guang Xiang, Jason I. Hong
IDTRUST
2009
ACM
14 years 3 months ago
A calculus of trust and its application to PKI and identity management
We introduce a formal semantics based calculus of trust that explicitly represents trust and quantifies the risk associated with trust in public key infrastructure (PKI) and iden...
Jingwei Huang, David Nicol
DIM
2009
ACM
14 years 3 months ago
Mnikr: reputation construction through human trading of distributed social identities
Reputation forms an important part of how we come to trust people in face-to-face interactions, and thus situations involving trust online have come to realize that reputation is ...
Brendan Francis O'Connor, John Linwood Griffin
CORR
2010
Springer
99views Education» more  CORR 2010»
13 years 8 months ago
MIMO Identical Eigenmode Transmission System (IETS) - A Channel Decomposition Perspective
In the past few years considerable attention has been given to the design of multiple-input multiple-output (MIMO) eigenmode transmission systems (EMTS). This paper presents an in...
M. Zeeshan Shakir, Tariq S. Durrani