Sciweavers

130 search results - page 23 / 26
» New approaches for deniable authentication
Sort
View
TNC
2004
105views Education» more  TNC 2004»
13 years 9 months ago
Why Seamless? Towards Exploiting WLAN-Based Intermittent Connectivity on the Road
This paper discusses new mobile usage scenarios for WLAN technologies and presents an architecture that is based on the notion of intermittent connectivity instead of seamless con...
Jörg Ott, Dirk Kutscher
IEEESCC
2010
IEEE
13 years 7 months ago
A Service Packaging Platform for Delivering Services
—For a service to be used in a commercial setting, certain service delivery functions such as monitoring, billing, authentication, etc need to be packaged with the service. Becau...
Muhammad Adeel Talib, Alan W. Colman, Jun Han, Jus...
INFFUS
2011
82views more  INFFUS 2011»
12 years 12 months ago
Joint ego-motion and road geometry estimation
We provide a sensor fusion framework for solving the problem of joint ego-motion and road geometry estimation. More specifically we employ a sensor fusion framework to make syste...
Christian Lundquist, Thomas B. Schön
ICALP
2010
Springer
13 years 10 months ago
From Secrecy to Soundness: Efficient Verification via Secure Computation
d Abstract) Benny Applebaum1 , Yuval Ishai2 , and Eyal Kushilevitz3 1 Computer Science Department, Weizmann Institute of Science 2 Computer Science Department, Technion and UCLA 3 ...
Benny Applebaum, Yuval Ishai, Eyal Kushilevitz
DIM
2005
ACM
13 years 10 months ago
Establishing and protecting digital identity in federation systems
We develop solutions for the security and privacy of user identity information in a federation. By federation we mean a group of organizations or service providers which have buil...
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...