Sciweavers

287 search results - page 2 / 58
» Audio authentication based on distributed source coding
Sort
View
ICPADS
2005
IEEE
13 years 11 months ago
UNIDES: An Efficient Real-Time System to Detect and Block Unauthorized Internet Access
In the audit process of Internet activities of users in a local area network, one of the most difficult problems is the problem of source authentication i.e. establishing securely...
Yusuf Uzunay, Kemal Bicakci
ISMIR
2005
Springer
226views Music» more  ISMIR 2005»
13 years 11 months ago
Musical Genre Classification Enhanced by Improved Source Separation Technique
We present a system for musical genre classification based on audio features extracted from signals which correspond to distinct musical instrument sources. For the separation of...
Aristomenis S. Lampropoulos, Paraskevi S. Lampropo...
DSOM
2003
Springer
13 years 10 months ago
Idiosyncratic Signatures for Authenticated Execution of Management Code
TrustedFlow™ is a software solution to the problem of remotely authenticating code during execution. A continuous flow of idiosyncratic signatures assures that the software from ...
Mario Baldi, Yoram Ofek, Moti Yung
IJNSEC
2007
122views more  IJNSEC 2007»
13 years 5 months ago
Group Oriented Identity-based Deniable Authentication Protocol from the Bilinear Pairings
Deniable authentication protocol is different from traditional authentication protocol in that the intended receiver can authenticate the source of a given message, but cannot pr...
Rongxing Lu, Zhenfu Cao
COMCOM
2011
13 years 13 days ago
TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks
Key distribution in Wireless Sensor Networks (WSNs) is challenging. Symmetric cryptosystems can perform it efficiently, but they often do not provide a perfect trade-off between ...
Leonardo B. Oliveira, Diego F. Aranha, Conrado Por...