Sciweavers

182 search results - page 15 / 37
» Identity the Civic Scenario
Sort
View
SAC
2006
ACM
14 years 4 months ago
Bootstrapping multi-party ad-hoc security
Increasingly pervasive computing throws up scenarios where users may wish to achieve some degree of security in their interaction with other people or equipment, in contexts where...
Sadie Creese, Michael Goldsmith, Bill Roscoe, Ming...
BIOID
2008
134views Biometrics» more  BIOID 2008»
14 years 12 days ago
Advanced Studies on Reproducibility of Biometric Hashes
The determination of hashes based on biometric data is a recent topic in biometrics as it allows to handle biometric templates in a privacy manner. Applications could be the genera...
Tobias Scheidat, Claus Vielhauer, Jana Dittmann
CISC
2008
Springer
152views Cryptology» more  CISC 2008»
14 years 11 days ago
Privacy for Private Key in Signatures
One of the important applications of digital signature is anonymous credential or pseudonym system. In these scenarios, it is essential that the identity of the signer is kept secr...
Qianhong Wu, Bo Qin, Yi Mu, Willy Susilo
ACCV
2009
Springer
13 years 11 months ago
Person De-identification in Videos
Advances in cameras and web technology have made it easy to capture and share large amounts of video data over to a large number of people. A large number of cameras oversee public...
Prachi Agrawal, P. J. Narayanan
ICASSP
2010
IEEE
13 years 10 months ago
Low-latency online speaker tracking on the AMI Corpus of meeting conversations
Ambient Inteligence aims to create smart spaces providing services in a transparent and non-intrusive fashion, so context awareness and user adaptation are key issues. Speech can ...
Maider Zamalloa, Luis Javier Rodríguez-Fuen...