Sciweavers

19 search results - page 4 / 4
» An Extremely Small and Efficient Identification Scheme
Sort
View
INFOCOM
2009
IEEE
13 years 11 months ago
ACTION: Breaking the Privacy Barrier for RFID Systems
—In order to protect privacy, Radio Frequency Identification (RFID) systems employ Privacy-Preserving Authentication (PPA) to allow valid readers to explicitly authenticate their...
Li Lu, Jinsong Han, Renyi Xiao, Yunhao Liu
USS
2010
13 years 2 months ago
P4P: Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users
In this paper we introduce a framework for privacypreserving distributed computation that is practical for many real-world applications. The framework is called Peers for Privacy ...
Yitao Duan, NetEase Youdao, John Canny, Justin Z. ...
HCW
2000
IEEE
13 years 9 months ago
Evaluation of PAMS' Adaptive Management Services
Management of large-scale parallel and distributed applications is an extremely complex task due to factors such as centralized management architectures, lack of coordination and ...
Yoonhee Kim, Salim Hariri, Muhamad Djunaedi
ICCV
2011
IEEE
12 years 8 months ago
Outdoor Human Motion Capture using Inverse Kinematics and von Mises-Fisher Sampling
Human motion capturing (HMC) from multiview image sequences constitutes an extremely difficult problem due to depth and orientation ambiguities and the high dimensionality of the s...
Gerard Pons-Moll, Andreas Baak, Juergen Gall, Laur...