Sciweavers

632 search results - page 112 / 127
» Two Facets of Authentication
Sort
View
PR
2008
87views more  PR 2008»
13 years 8 months ago
Two-dimensional Laplacianfaces method for face recognition
In this paper we propose a two-dimensional (2D) Laplacianfaces method for face recognition. The new algorithm is developed based on two techniques, i.e., locality preserved embedd...
Ben Niu, Qiang Yang, Simon Chi-Keung Shiu, Sankar ...
TDSC
2008
125views more  TDSC 2008»
13 years 8 months ago
Trustworthy Computing under Resource Constraints with the DOWN Policy
Trustworthy computing modules like secure coprocessors (ScP) are already in extensive use today, albeit limited predominantly to scenarios where constraints on cost is not a seriou...
Mahalingam Ramkumar
CORR
2002
Springer
93views Education» more  CORR 2002»
13 years 8 months ago
Secure History Preservation Through Timeline Entanglement
A secure timeline is a tamper-evident historic record of the states through which a system goes throughout its operational history. Secure timelines can help us reason about the t...
Petros Maniatis, Mary Baker
JCS
2002
118views more  JCS 2002»
13 years 8 months ago
Verified Formal Security Models for Multiapplicative Smart Cards
We present two generic formal security models for operating systems of multiapplicative smart cards. The models formalize the main security aspects of secrecy, integrity, secure co...
Gerhard Schellhorn, Wolfgang Reif, Axel Schairer, ...
EUROMED
2010
13 years 7 months ago
Complementary Approach for Vernacular Wooden Frame Structures Reconstruction
The research is focused on traditional timber frame structures (TFS) situated in rural areas. Often neglected, remaining examples embody our build Heritage. However, architects hav...
Laurent Debailleux