Sciweavers

6137 search results - page 1160 / 1228
» Securing Collaborative Applications
Sort
View
TIFS
2008
149views more  TIFS 2008»
13 years 8 months ago
Using One-Class SVMs and Wavelets for Audio Surveillance
This paper presents a procedure aimed at recognizing environmental sounds for surveillance and security applications. We propose to apply One-Class Support Vector Machines (1-SVMs...
Asma Rabaoui, Manuel Davy, Stéphane Rossign...
JCM
2007
143views more  JCM 2007»
13 years 8 months ago
A Simple Privacy Protecting Scheme Enabling Delegation and Ownership Transfer for RFID Tags
— RFID (Radio frequency identification) technology raises many privacy concerns among which the potential tracking of an RFID tag bearer and the eventuality of an illegitimate r...
Sepideh Fouladgar, Hossam Afifi
JSA
2007
139views more  JSA 2007»
13 years 8 months ago
High-speed hardware implementations of Elliptic Curve Cryptography: A survey
For the last decade, Elliptic Curve Cryptography (ECC) has gained increasing acceptance in the industry and the academic community and has been the subject of several standards. T...
Guerric Meurice de Dormale, Jean-Jacques Quisquate...
JSAC
2007
95views more  JSAC 2007»
13 years 8 months ago
Experiences in implementing an experimental wide-area GMPLS network
In this article, we describe our experiences in implementing an experimental wide-area GMPLS network called CHEETAH (Circuit-Switched End-to-End Transport Architecture). The key c...
Xiangfei Zhu, Xuan Zheng, Malathi Veeraraghavan
JSAC
2007
93views more  JSAC 2007»
13 years 8 months ago
Eviction of Misbehaving and Faulty Nodes in Vehicular Networks
— Vehicular Networks (VNs) are emerging, among civilian applications, as a convincing instantiation of the mobile networking technology. However, security is a critical factor an...
Maxim Raya, Panagiotis Papadimitratos, Imad Aad, D...
« Prev « First page 1160 / 1228 Last » Next »