Sciweavers

242 search results - page 23 / 49
» Practical Digital Signature Generation Using Biometrics
Sort
View
HICSS
2008
IEEE
114views Biometrics» more  HICSS 2008»
14 years 2 months ago
Personality and Technology Acceptance: Personal Innovativeness in IT, Openness and Resistance to Change
Individual users are known to differ in their tendency to adopt new technologies. Among the individual differences, Personal Innovativeness in IT (PIIT) has been shown to be a rel...
Oded Nov, Chen Ye
ACNS
2010
Springer
172views Cryptology» more  ACNS 2010»
13 years 11 months ago
Secure Sketch for Multiple Secrets
Secure sketches are useful in extending cryptographic schemes to biometric data since they allow recovery of fuzzy secrets under inevitable noise. In practice, secrets derived from...
Chengfang Fang, Qiming Li, Ee-Chien Chang
WIMOB
2008
IEEE
14 years 2 months ago
On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks
Energy is a central concern in the deployment of wireless sensor networks. In this paper, we investigate the energy cost of cryptographic protocols, both from a communication and ...
Giacomo de Meulenaer, François Gosset, Fran...
EUROSYS
2009
ACM
14 years 4 months ago
Pointless tainting?: evaluating the practicality of pointer tainting
This paper evaluates pointer tainting, an incarnation of Dynamic Information Flow Tracking (DIFT), which has recently become an important technique in system security. Pointer tai...
Asia Slowinska, Herbert Bos
HICSS
1995
IEEE
109views Biometrics» more  HICSS 1995»
13 years 11 months ago
HINT: A new way to measure computer performance
The computing community has long faced the problem of scientifically comparing different computers and different algorithms. When architecture, method, precision, or storage capac...
John L. Gustafson, Quinn Snell