Sciweavers

632 search results - page 109 / 127
» Two Facets of Authentication
Sort
View
CARDIS
2010
Springer
159views Hardware» more  CARDIS 2010»
14 years 2 days ago
Modeling Privacy for Off-Line RFID Systems
This paper establishes a novel model for RFID schemes where readers are not continuously connected to the back office, but only periodically. Furthermore, adversaries are not only ...
Flavio D. Garcia, Peter van Rossum
LISA
2007
13 years 11 months ago
Usher: An Extensible Framework for Managing Clusters of Virtual Machines
Usher is a virtual machine management system designed to impose few constraints upon the computing environment under its management. Usher enables administrators to choose how the...
Marvin McNett, Diwaker Gupta, Amin Vahdat, Geoffre...
ADHOCNOW
2010
Springer
13 years 10 months ago
Data Aggregation Integrity Based on Homomorphic Primitives in Sensor Networks
Designing message integrity schemes for data aggregation is an imperative problem for securing wireless sensor networks. In this paper, we propose three secure aggregation schemes ...
Zhijun Li, Guang Gong
LREC
2010
111views Education» more  LREC 2010»
13 years 10 months ago
Resources for Speech Synthesis of Viennese Varieties
This paper describes our work on developing corpora of three varieties of Viennese for unit selection speech synthesis. The synthetic voices for Viennese varieties, implemented wi...
Michael Pucher, Friedrich Neubarth, Volker Strom, ...
LREC
2008
113views Education» more  LREC 2008»
13 years 10 months ago
Integration of a Multilingual Keyword Extractor in a Document Management System
In this paper we present a new Document Management System called DrStorage. This DMS is multi-platform, JCR-170 compliant, supports WebDav, versioning, user authentication and aut...
Andrea Agili, Marco Fabbri, Alessandro Panunzi, Ma...