Sciweavers

38 search results - page 7 / 8
» On the Impossibility of Strong Encryption Over
Sort
View
AMFG
2007
IEEE
327views Biometrics» more  AMFG 2007»
13 years 11 months ago
Model-Assisted 3D Face Reconstruction from Video
Abstract. This paper describes a model-assisted system for reconstruction of 3D faces from a single consumer quality camera using a structure from motion approach. Typical multi-vi...
Douglas Fidaleo, Gérard G. Medioni
ICISC
2009
184views Cryptology» more  ICISC 2009»
13 years 3 months ago
Efficient Privacy-Preserving Face Recognition
Abstract. Automatic recognition of human faces is becoming increasingly popular in civilian and law enforcement applications that require reliable recognition of humans. However, t...
Ahmad-Reza Sadeghi, Thomas Schneider 0003, Immo We...
IIS
2003
13 years 6 months ago
Web Search Results Clustering in Polish: Experimental Evaluation of Carrot
Abstract. In this paper we consider the problem of web search results clustering in the Polish language, supporting our analysis with results acquired from an experimental system n...
Dawid Weiss, Jerzy Stefanowski
IMC
2007
ACM
13 years 6 months ago
Cryptographic strength of ssl/tls servers: current and recent practices
The Secure Socket Layer (SSL) and its variant, Transport Layer Security (TLS), are used toward ensuring server security. In this paper, we characterize the cryptographic strength ...
Homin K. Lee, Tal Malkin, Erich M. Nahum
INFOCOM
2009
IEEE
13 years 12 months ago
FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks
—Distributed sensor data storage and retrieval has gained increasing popularity in recent years for supporting various applications. While distributed architecture enjoys a more ...
Shucheng Yu, Kui Ren, Wenjing Lou