Sciweavers

252 search results - page 41 / 51
» On Robust Key Agreement Based on Public Key Authentication
Sort
View
AP2PC
2007
Springer
13 years 9 months ago
Design of a Secure and Decentralized Location Service for Agent Platforms
Abstract. Agent platforms designed for Internet-scale, open networks need scalable and secure location services for agents and services. The location service based on the Fonkey pu...
Benno J. Overeinder, Michel Oey, Reinier Timmer, R...
CVPR
2007
IEEE
14 years 2 months ago
Shape Variation-Based Frieze Pattern for Robust Gait Recognition
Gait is an attractive biometric for vision-based human identification. Previous work on existing public data sets has shown that shape cues yield improved recognition rates compar...
Seungkyu Lee, Yanxi Liu, Robert T. Collins
USITS
1997
13 years 9 months ago
Lightweight Security Primitives for E-Commerce
Emerging applications in electronic commerce often involve very low-cost transactions, which execute in the context of ongoing, extended clientserver relationships. For example, c...
Yossi Matias, Alain J. Mayer, Abraham Silberschatz
CCS
2001
ACM
14 years 11 days ago
A new approach to DNS security (DNSSEC)
The Domain Name System (DNS) is a distributed database that allows convenient storing and retrieving of resource records. DNS has been extended to provide security services (DNSSE...
Giuseppe Ateniese, Stefan Mangard
TCS
2008
13 years 7 months ago
A simple transitive signature scheme for directed trees
Transitive signatures allow a signer to authenticate edges in a graph in such a way that anyone, given the public key and two signatures on adjacent edges (i, j) and (j, k), can c...
Gregory Neven