Sciweavers

1116 search results - page 90 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
FC
2005
Springer
149views Cryptology» more  FC 2005»
14 years 1 months ago
Ciphire Mail Email Encryption and Authentication
Abstract. Ciphire Mail is cryptographic software that provides email encryption and digital signatures. The Ciphire Mail client resides on the user's computer between the emai...
Lars Eilebrecht
ICCV
2007
IEEE
14 years 10 months ago
Geolocating Static Cameras
A key problem in widely distributed camera networks is geolocating the cameras. This paper considers three scenarios for camera localization: localizing a camera in an unknown env...
Nathan Jacobs, Scott Satkin, Nathaniel Roman, Robe...
JUCS
2010
130views more  JUCS 2010»
13 years 2 months ago
Toward an Integrated Tool Environment for Static Analysis of UML Class and Sequence Models
: There is a need for more rigorous analysis techniques that developers can use for verifying the critical properties in UML models. The UML-based Specification Environment (USE) t...
Wuliang Sun, Eunjee Song, Paul C. Grabow, Devon M....
ACNS
2008
Springer
94views Cryptology» more  ACNS 2008»
13 years 10 months ago
An Authentication Scheme Based on the Twisted Conjugacy Problem
The conjugacy search problem in a group G is the problem of recovering an x G from given g G and h = x-1 gx. The alleged computational hardness of this problem in some groups was...
Vladimir Shpilrain, Alexander Ushakov
DRM
2007
Springer
14 years 2 months ago
Randomized radon transforms for biometric authentication via fingerprint hashing
We present a new technique for generating biometric fingerprint hashes, or summaries of information contained in human fingerprints. Our method calculates and aggregates various...
Mariusz H. Jakubowski, Ramarathnam Venkatesan