Sciweavers

1573 search results - page 44 / 315
» Strong User Authentication
Sort
View
ASIACRYPT
2005
Springer
14 years 4 months ago
Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application
In this paper, we discuss non-interactive updating of decryption keys in identity-based encryption (IBE). IBE is a public key cryptosystem where a public key is an arbitrary strin...
Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, H...
SSDBM
2010
IEEE
166views Database» more  SSDBM 2010»
14 years 3 months ago
Bridging Workflow and Data Provenance Using Strong Links
Abstract. As scientists continue to migrate their work to computational methods, it is important to track not only the steps involved in the computation but also the data consumed ...
David Koop, Emanuele Santos, Bela Bauer, Matthias ...
JSW
2008
96views more  JSW 2008»
13 years 11 months ago
A Collaborative Inter-Data Grid Strong Semantic Model with Hybrid Namespace
The Data Grid, like all other collaboration models, has strict rules for contributors to follow and many criteria to abide with. Namespace is one of the rules that govern the contr...
Dalia El-Mansy, Ahmed Sameh
ICCV
2011
IEEE
12 years 11 months ago
Strong Supervision From Weak Annotation: Interactive Training of Deformable Part Models
We propose a framework for large scale learning and annotation of structured models. The system interleaves interactive labeling (where the current model is used to semiautomate t...
Steven Branson, Pietro Perona, Serge Belongie
PERCOM
2007
ACM
14 years 10 months ago
Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems
The objective of private authentication for Radio Frequency Identification (RFID) systems is to allow valid readers to explicitly authenticate their dominated tags without leaking...
Li Lu, Jinsong Han, Lei Hu, Yunhao Liu, Lionel M. ...