Sciweavers

1834 search results - page 259 / 367
» Public Key Cryptography
Sort
View
SIBGRAPI
2008
IEEE
14 years 2 months ago
A New Training Algorithm for Pattern Recognition Technique Based on Straight Line Segments
Recently, a new Pattern Recognition technique based on straight line segments (SLSs) was presented. The key issue in this new technique is to find a function based on distances b...
João Henrique Burckas Ribeiro, Ronaldo Fumi...
ACISP
2008
Springer
14 years 2 months ago
Secure Biometric Authentication with Improved Accuracy
Abstract. We propose a new hybrid protocol for cryptographically secure biometric authentication. The main advantages of the proposed protocol over previous solutions can be summar...
Manuel Barbosa, Thierry Brouard, Stéphane C...
HICSS
2007
IEEE
121views Biometrics» more  HICSS 2007»
14 years 2 months ago
Theorizing in Information Systems Research: Some Preliminary Findings
Information systems (IS) research employs a wide range of theory, drawn from numerous disciplines. Over the course of the past three decades, the proliferation of theory has creat...
Brent Furneaux, Michael Wade, Hossam Ali-Hassan
SACI
2007
IEEE
14 years 2 months ago
Implementation of an Authentication Protocol for Sending Audio-Video Information in Java
— an application for assuring the authenticity of audio-video information is developed. The application is implemented in Java by using Java Media Framework to send audio and vid...
Bogdan Groza, Dorina Petrica, Simona Barbu, Marian...
ECAL
2007
Springer
14 years 2 months ago
Guided Self-organisation for Autonomous Robot Development
Abstract. The paper presents a method to guide the self-organised development of behaviours of autonomous robots. In earlier publications we demonstrated how to use the homeokinesi...
Georg Martius, J. Michael Herrmann, Ralf Der