Sciweavers

859 search results - page 117 / 172
» Security for Key Management Interfaces
Sort
View
ICMCS
2010
IEEE
146views Multimedia» more  ICMCS 2010»
13 years 11 months ago
Privacy-preserving approximation of L1 distance for multimedia applications
Alice and Bob possess sequences x and y respectively and would like to compute the 1 distance, namely x - y 1 under privacy and communication constraints. The privacy constraint r...
Shantanu Rane, Wei Sun, Anthony Vetro
TISSEC
2008
202views more  TISSEC 2008»
13 years 9 months ago
A Framework for Identifying Compromised Nodes in Wireless Sensor Networks
compromised sensor nodes. The framework provides an appropriate abstraction of applicationspecific detection mechanisms and models the unique properties of sensor networks. Based o...
Qing Zhang, Ting Yu, Peng Ning
SPATIALCOGNITION
2000
Springer
14 years 1 months ago
From Motion Observation to Qualitative Motion Representation
Since humans usually prefer to communicate in qualitative and not in quantitative categories, qualitative spatial representations are of great importance interfaces of systems that...
Alexandra Musto, Klaus Stein, Andreas Eisenkolb, T...
DIM
2007
ACM
14 years 1 months ago
Implementing identity provider on mobile phone
We have implemented an identity provider (IdP), which is defined by the Liberty Alliance on a mobile phone. We propose an authentication method, which uses this personal IdP as a ...
Tsuyoshi Abe, Hiroki Itoh, Kenji Takahashi
GI
2009
Springer
14 years 1 months ago
Improving Usability of Integrated Emergency Response Systems: The SoKNOS Approach
: Implementing systems for emergency response poses various challenges. Information from various sources and systems needs to be integrated, processed, aggregated, and visualized i...
Heiko Paulheim, Sebastian Döweling, Karen H. ...