Sciweavers

1018 search results - page 42 / 204
» Remote User Authentication Using Public Information
Sort
View
ECIR
2007
Springer
13 years 10 months ago
Results Merging Algorithm Using Multiple Regression Models
: This paper describes a new algorithm for merging the results of remote collections in a distributed information retrieval environment. The algorithm makes use only of the ranks o...
Georgios Paltoglou, Michail Salampasis, Maria Satr...
ACSAC
2003
IEEE
14 years 29 days ago
Scalable and Efficient PKI for Inter-Organizational Communication
We propose an efficient and flexible system for a secure and authentic data exchange in a multiinstitutional environment, where the institutions maintain different databases and p...
Arne Ansper, Ahto Buldas, Margus Freudenthal, Jan ...
VR
2010
IEEE
235views Virtual Reality» more  VR 2010»
13 years 7 months ago
VirtualizeMe: Real-time avatar creation for Tele-Immersion environments
VirtualizeMe introduces a new design for a fully immersive TeleImmersion system for remote collaboration and virtual world interaction. This system introduces a new avatar creatio...
Daniel Knoblauch, Pau Moreno Font, Falko Kuester
STORAGESS
2005
ACM
14 years 2 months ago
Toward securing untrusted storage without public-key operations
Adding security capabilities to shared, remote and untrusted storage file systems leads to performance degradation that limits their use. Public-key cryptographic primitives, wid...
Dalit Naor, Amir Shenhav, Avishai Wool
FC
2005
Springer
98views Cryptology» more  FC 2005»
14 years 2 months ago
Secure Biometric Authentication for Weak Computational Devices
This paper presents computationally “lightweight” schemes for performing biometric authentication that carry out the comparison stage without revealing any information that can...
Mikhail J. Atallah, Keith B. Frikken, Michael T. G...