Sciweavers

1610 search results - page 38 / 322
» Identity Based Multisignatures
Sort
View
IJSWIS
2008
108views more  IJSWIS 2008»
13 years 8 months ago
Identity of Resources and Entities on the Web
One of the main strengths of the web is that it allows any party of its global community to share information with any other party. This goal has been achieved by making use of a u...
Valentina Presutti, Aldo Gangemi
CVPR
2006
IEEE
14 years 10 months ago
Using Bilinear Models for View-invariant Action and Identity Recognition
Human identification from gait is a challenging task in realistic surveillance scenarios in which people walking along arbitrary directions are shot by a single camera. In this pa...
Fabio Cuzzolin
DIM
2005
ACM
13 years 10 months ago
Establishing and protecting digital identity in federation systems
We develop solutions for the security and privacy of user identity information in a federation. By federation we mean a group of organizations or service providers which have buil...
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...
NETWORKING
2007
13 years 10 months ago
Multiple Identities in BitTorrent Networks
Abstract. Peer-to-peer (P2P) file sharing systems have become ubiquitous and at present the BitTorrent (BT) based P2P systems are very popular and successful. It has been argued t...
Jin Sun, Anirban Banerjee, Michalis Faloutsos
SIGUCCS
2005
ACM
14 years 2 months ago
A case study: implementing novell identity management at Drew University
Starting in 2003, Drew University began a process to replace its manual account management procedures with an automated provisioning system based upon Novell technologies. Over th...
E. Axel Larsson