Sciweavers

158 search results - page 32 / 32
» Cognitive security for personal devices
Sort
View
IJISEC
2007
119views more  IJISEC 2007»
13 years 5 months ago
An incentive compatible reputation mechanism for ubiquitous computing environments
The vision of ubiquitous computing is becoming a reality thanks to the advent of portable devices and the advances in wireless networking technologies. It aims to facilitate user ...
Jinshan Liu, Valérie Issarny
JUCS
2010
124views more  JUCS 2010»
13 years 3 months ago
Performance Optimizations for DAA Signatures on Java enabled Platforms
: With the spreading of embedded and mobile devices, public-key cryptography has become an important feature for securing communication and protecting personal data. However, the c...
Kurt Dietrich, Franz Röck
AVBPA
2005
Springer
395views Biometrics» more  AVBPA 2005»
13 years 7 months ago
A Score-Level Fusion Benchmark Database for Biometric Authentication
Fusing the scores of several biometric systems is a very promising approach to improve the overall system’s accuracy. Despite many works in the literature, it is surprising that ...
Norman Poh, Samy Bengio