Sciweavers

48 search results - page 2 / 10
» sec 2008
Sort
View
SEC
2008
13 years 6 months ago
Interactive Selection of ISO 27001 Controls under Multiple Objectives
Abstract IT security incidents pose a major threat to the efficient execution of corporate strategies. Although, information security standards provide a holistic approach to mitig...
Thomas Neubauer, Andreas Ekelhart, Stefan Fenz
SEC
2008
13 years 6 months ago
Realizing Stateful Public Key Encryption in Wireless Sensor Network
In this paper, we present our implementation of a stateful public key encryption (stateful PKE) scheme in the wireless sensor network (WSN) environment. In order to reduce the com...
Joonsang Baek, Han Chiang Tan, Jianying Zhou, Jun ...
LREC
2008
181views Education» more  LREC 2008»
13 years 6 months ago
BioSec Multimodal Biometric Database in Text-Dependent Speaker Recognition
In this paper we briefly describe the BioSec multimodal biometric database and analyze its use in automatic text-dependent speaker
Doroteo Torre Toledano, Daniel Hernández L&...
ICA
2010
Springer
13 years 4 months ago
The 2010 Signal Separation Evaluation Campaign (SiSEC2010): Audio Source Separation
Abstract. This paper introduces the audio part of the 2010 communitybased Signal Separation Evaluation Campaign (SiSEC2010). Seven speech and music datasets were contributed, which...
Shoko Araki, Alexey Ozerov, Vikrham Gowreesunker, ...
CORR
2008
Springer
112views Education» more  CORR 2008»
13 years 4 months ago
SecMon: End-to-End Quality and Security Monitoring System
The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and mergi...
Tomasz Ciszkowski, Charlott Eliasson, Markus Fiedl...