Sciweavers

137 search results - page 23 / 28
» Verifiable Attribute Based Encryption
Sort
View
SPATIALCOGNITION
1998
Springer
14 years 2 days ago
The Impact of Exogenous Factors on Spatial Coding in Perception and Memory
In the course of acquiring knowledge about layouts and maps spatial information can undergo considerable changes and distortions, which systematically affect knowledge-based judgme...
Jörg Gehrke, Bernhard Hommel
MOBISYS
2007
ACM
14 years 7 months ago
Addressing security in medical sensor networks
We identify the security challenges facing a sensor network for wireless health monitoring, and propose an architecture called "SNAP" (Sensor Network for Assessment of P...
Kriangsiri Malasri, Lan Wang
CCS
2007
ACM
14 years 2 months ago
Split-ballot voting: everlasting privacy with distributed trust
In this paper we propose a new voting protocol with desirable security properties. The voting stage of the protocol can be performed by humans without computers; it provides every...
Tal Moran, Moni Naor
JDCTA
2010
150views more  JDCTA 2010»
13 years 2 months ago
Provable Password-Authenticated Key Exchange Protocol against Imposter Attack on Ad Hoc Networks
In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encrypted Key Exchange (EKE) protocol against offline dictionary attacks using both ...
Ang Gao
ICB
2009
Springer
226views Biometrics» more  ICB 2009»
14 years 2 months ago
Accurate Palmprint Recognition Using Spatial Bags of Local Layered Descriptors
Abstract. State-of-the-art palmprint recognition algorithms achieve high accuracy based on component based texture analysis. However, they are still sensitive to local variations o...
Yufei Han, Tieniu Tan, Zhenan Sun