Sciweavers

609 search results - page 90 / 122
» One-Time-Password-Authenticated Key Exchange
Sort
View
VLDB
2004
ACM
104views Database» more  VLDB 2004»
14 years 7 months ago
Retrieval effectiveness of an ontology-based model for information selection
Technology in the field of digital media generates huge amounts of nontextual information, audio, video, and images, along with more familiar textual information. The potential for...
Latifur Khan, Dennis McLeod, Eduard H. Hovy
NDSS
2007
IEEE
14 years 1 months ago
Secret Handshakes with Dynamic and Fuzzy Matching
The need for communication privacy over public networks is of growing concern in today’s society. As a result, privacy-preserving authentication and key exchange protocols have ...
Giuseppe Ateniese, Jonathan Kirsch, Marina Blanton
ACIVS
2007
Springer
14 years 1 months ago
Spatiotemporal Fusion Framework for Multi-camera Face Orientation Analysis
In this paper, we propose a collaborative technique for face orientation estimation in smart camera networks. The proposed spatiotemporal feature fusion analysis is based on active...
Chung-Ching Chang, Hamid K. Aghajan
INFOCOM
2006
IEEE
14 years 1 months ago
CARA: Collision-Aware Rate Adaptation for IEEE 802.11 WLANs
— Today’s IEEE 802.11 WLANs (Wireless LANs) provide multiple transmission rates so that different rates can be exploited in an adaptive manner depending on the underlying chann...
Jongseok Kim, Seongkwan Kim, Sunghyun Choi, Daji Q...
ISPASS
2005
IEEE
14 years 1 months ago
Anatomy and Performance of SSL Processing
A wide spectrum of e-commerce (B2B/B2C), banking, financial trading and other business applications require the exchange of data to be highly secure. The Secure Sockets Layer (SSL...
Li Zhao, Ravi R. Iyer, Srihari Makineni, Laxmi N. ...