Sciweavers

ICASSP
2011
IEEE
12 years 11 months ago
A 3-layer coding scheme for biometry template protection based on spectral minutiae
—Spectral Minutiae (SM) representation enables the combination of minutiae-based fingerprint recognition systems with template protection schemes based on fuzzy commitment, but ...
Xiaoying Shao, Haiyun Xu, Raymond N. J. Veldhuis, ...
ICPP
2009
IEEE
13 years 5 months ago
Heterogeneity-Aware Erasure Codes for Peer-to-Peer Storage Systems
Peer-to-peer (P2P) storage systems rely on data redundancy to obtain high levels of data availability. Among the existing data redundancy schemes, erasure coding is a widely adopte...
Lluis Pamies-Juarez, Pedro García Ló...
CCS
2006
ACM
13 years 11 months ago
Lightweight, pollution-attack resistant multicast authentication scheme
Authentication is an important security measure for multicast applications, providing receivers with confidence that the packets they receive are valid. Simply signing every multi...
Ya-Jeng Lin, Shiuhpyng Shieh, Warren W. Lin
ICC
2007
IEEE
108views Communications» more  ICC 2007»
14 years 1 months ago
Achieving High Goodput Performance in Mars Missions through Application Layer Coding and Transmission Power Trading
— Transferring data reliably from Mars to Earth stations is becoming an appealing challenge in the design of interplanetary networks. In this view, the use of CCSDS-based protoco...
Tomaso de Cola, Harald Ernst, Mario Marchese
ISCC
2009
IEEE
188views Communications» more  ISCC 2009»
14 years 2 months ago
Distributed Erasure Coding in Data Centric Storage for wireless sensor networks
Abstract—In-network storage of data in wireless sensor networks contributes to reduce the communications inside the network and to favor data aggregation. In this paper, we consi...
Michele Albano, Stefano Chessa