Sciweavers

1610 search results - page 71 / 322
» Identity Based Multisignatures
Sort
View
135
Voted
PERCOM
2010
ACM
15 years 13 days ago
Privacy-preserving admission to mobile peer-to-peer groups
Mobile peer-to-peer groups, which do not require any pre-deployed infrastructure or trusted centralized authority are valuable for a variety of collaborative applications. This wor...
Mark Manulis
BIOSIG
2009
102views Biometrics» more  BIOSIG 2009»
15 years 12 days ago
SAMLizing the European Citizen Card
: While the use of Federated Identity Management and Single Sign-On based on the Security Assertion Markup Language (SAML) standards becomes more and more important, there are quit...
Jan Eichholz, Detlef Hühnlein, Jörg Schw...
DSL
2009
15 years 11 days ago
A Haskell Hosted DSL for Writing Transformation Systems
KURE is a Haskell hosted Domain Specific Language (DSL) for writing transformation systems based on rewrite strategies. When writing transformation systems, a significant amount of...
Andy Gill
ICIP
2009
IEEE
15 years 9 days ago
A new representation method of head images for head pose estimation
In this paper, a discriminative representation method of head images is proposed, which is based on parts and poses for identity-independent head pose estimation. Head images are ...
Xiangyang Liu, Hongtao Lu, Heng Luo
AIL
2010
60views more  AIL 2010»
15 years 7 hour ago
Network-based filtering for large email collections in E-Discovery
The information overload in E-Discovery proceedings makes reviewing expensive and it increases the risk of failure to produce results on time and consistently. New interactive tec...
Hans Henseler