Sciweavers

5123 search results - page 141 / 1025
» Performance and Security Tradeoff
Sort
View
ICIP
2008
IEEE
16 years 6 months ago
TAC: Thresholding active contours
In this paper, we describe a region-based active contour technique to perform image segmentation. We propose an energy functional that realizes an explicit trade-off between the (...
Samuel Dambreville, Anthony J. Yezzi, Shawn Lankto...
123
Voted
ADHOCNOW
2010
Springer
15 years 6 months ago
Data Aggregation Integrity Based on Homomorphic Primitives in Sensor Networks
Designing message integrity schemes for data aggregation is an imperative problem for securing wireless sensor networks. In this paper, we propose three secure aggregation schemes ...
Zhijun Li, Guang Gong
JCP
2006
120views more  JCP 2006»
15 years 4 months ago
Password-authenticated Key Exchange using Efficient MACs
Abstract-- This paper is concerned with passwordauthenticated key agreement protocols. Designing such protocols represents an interesting challenge since there is no standard way o...
Maurizio Adriano Strangio
ITIIS
2010
128views more  ITIIS 2010»
15 years 3 months ago
Semi-trusted Collaborative Framework for Multi-party Computation
Data sharing is an essential process for collaborative works particularly in the banking, finance and healthcare industries. These industries require many collaborative works with...
Kok Seng Wong, Myung Ho Kim
CCS
2010
ACM
15 years 2 months ago
Assessing trust in uncertain information using Bayesian description logic
Decision makers (humans or software agents alike) are faced with the challenge of examining large volumes of information originating from heterogeneous sources with the goal of as...
Achille Fokoue, Mudhakar Srivatsa, Robert Young