Sciweavers

859 search results - page 11 / 172
» The Changing Face of Cryptography
Sort
View
ICB
2007
Springer
208views Biometrics» more  ICB 2007»
14 years 26 days ago
Face Matching Between Near Infrared and Visible Light Images
Abstract. In many applications, such as E-Passport and driver’s license, the enrollment of face templates is done using visible light (VIS) face images. Such images are normally ...
Dong Yi, Rong Liu, Rufeng Chu, Zhen Lei, Stan Z. L...
ICRA
2008
IEEE
177views Robotics» more  ICRA 2008»
14 years 1 months ago
Detecting and tracking of 3D face pose for human-robot interaction
— Faces play a major role in many HCI systems, because they represent a rich source of information. Being able to estimate the 3D face pose in real-time, we can get a clue about ...
Fadi Dornaika, Bogdan Raducanu
ICASSP
2011
IEEE
12 years 10 months ago
A robust feature extraction algorithm based on class-Modular Image Principal Component Analysis for face verification
Face verification systems reach good performance on ideal environmental conditions. Conversely, they are very sensitive to non-controlled environments. This work proposes the cla...
Jose Francisco Pereira, Rafael M. Barreto, George ...
ACNS
2008
Springer
132views Cryptology» more  ACNS 2008»
14 years 1 months ago
Analysis of EAP-GPSK Authentication Protocol
Abstract. The EAP-GPSK protocol is a lightweight, flexible authentication protocol relying on symmetric key cryptography. It is part of an ongoing IETF process to develop authenti...
John C. Mitchell, Arnab Roy, Paul Rowe, Andre Sced...
EUROPKI
2007
Springer
14 years 26 days ago
Applicability of Public Key Infrastructures in Wireless Sensor Networks
Abstract. Wireless Sensor Networks (WSN) are becoming a key technology in the support of pervasive and ubiquitous services. The previous notion of “PKC is too expensive for WSN...
Rodrigo Roman, Cristina Alcaraz