Sciweavers

1403 search results - page 222 / 281
» Security Model for XML Data
Sort
View
CCS
2008
ACM
13 years 10 months ago
Towards practical biometric key generation with randomized biometric templates
Although biometrics have garnered significant interest as a source of entropy for cryptographic key generation, recent studies indicate that many biometric modalities may not actu...
Lucas Ballard, Seny Kamara, Fabian Monrose, Michae...
IEEEHPCS
2010
13 years 3 months ago
XPSoC: A reconfigurable solution for multimedia contents protection
Network Multimedia data also need to be encrypted to protect private content and access control. Considering performance constraints and embedded system issues, many hardware solu...
Linfeng Ye, Jean-Philippe Diguet, Guy Gogniat
VRML
2003
ACM
14 years 2 months ago
3D virtual clothing: from garment design to web3d visualization and simulation
One of the major challenges in Computer Graphics concerns the 3D representation and physically-based simulation of garments. In our research, we are working closely with the texti...
Luca Chittaro, Demis Corvaglia
BMCBI
2004
124views more  BMCBI 2004»
13 years 8 months ago
The Molecular Pages of the mesotelencephalic dopamine consortium (DopaNet)
Background: DopaNet http://www.dopanet.org is a Systems Biology initiative that aims to investigate precisely and quantitatively all the aspects of neurotransmission in a specific...
Nicolas Le Novère, Marco Donizelli
FAC
2007
128views more  FAC 2007»
13 years 8 months ago
Verifying a signature architecture: a comparative case study
Abstract. We report on a case study in applying different formal methods to model and verify an architecture for administrating digital signatures. The architecture comprises seve...
David A. Basin, Hironobu Kuruma, Kunihiko Miyazaki...