Sciweavers

72 search results - page 2 / 15
» A User Study Design for Comparing the Security of Registrati...
Sort
View
ISADS
1999
IEEE
13 years 9 months ago
A Secure Key Registration System based on Proactive Secret-Sharing Scheme
We designed a secure key registration system based on the proactive secret-sharing scheme. A user can register important data such as a session key to a distributed system in a (t...
Masayuki Numao
ACSAC
2009
IEEE
13 years 11 months ago
A Study of User-Friendly Hash Comparison Schemes
—Several security protocols require a human to compare two hash values to ensure successful completion. When the hash values are represented as long sequences of numbers, humans ...
Hsu-Chun Hsiao, Yue-Hsun Lin, Ahren Studer, Cassan...
TMI
2010
318views more  TMI 2010»
13 years 3 months ago
elastix: A Toolbox for Intensity-Based Medical Image Registration
—Medical image registration is an important task in medical image processing. It refers to the process of aligning data sets, possibly from different modalities (e.g., magnetic r...
Stefan Klein, Marius Staring, Keelin Murphy, Max A...
VISUALIZATION
2003
IEEE
13 years 10 months ago
Mental Registration of 2D and 3D Visualizations (An Empirical Study)
2D and 3D views are used together in many visualization domains, such as medical imaging, flow visualization, oceanographic visualization, and computer aided design (CAD).Combinin...
Melanie Tory
LCN
2006
IEEE
13 years 11 months ago
Efficient Packet Processing in User-Level OSes: A Study of UML
Network server consolidation has become popular through recent virtualization technology that builds secure, isolated network systems on shared hardware. One of the virtualization...
Younggyun Koh, Calton Pu, Sapan Bhatia, Charles Co...