Sciweavers

ICASSP
2011
IEEE
12 years 8 months ago
A 3-layer coding scheme for biometry template protection based on spectral minutiae
—Spectral Minutiae (SM) representation enables the combination of minutiae-based fingerprint recognition systems with template protection schemes based on fuzzy commitment, but ...
Xiaoying Shao, Haiyun Xu, Raymond N. J. Veldhuis, ...
ICPP
2009
IEEE
13 years 2 months ago
Heterogeneity-Aware Erasure Codes for Peer-to-Peer Storage Systems
Peer-to-peer (P2P) storage systems rely on data redundancy to obtain high levels of data availability. Among the existing data redundancy schemes, erasure coding is a widely adopte...
Lluis Pamies-Juarez, Pedro García Ló...
CCS
2006
ACM
13 years 8 months ago
Lightweight, pollution-attack resistant multicast authentication scheme
Authentication is an important security measure for multicast applications, providing receivers with confidence that the packets they receive are valid. Simply signing every multi...
Ya-Jeng Lin, Shiuhpyng Shieh, Warren W. Lin
ICC
2007
IEEE
108views Communications» more  ICC 2007»
13 years 11 months ago
Achieving High Goodput Performance in Mars Missions through Application Layer Coding and Transmission Power Trading
— Transferring data reliably from Mars to Earth stations is becoming an appealing challenge in the design of interplanetary networks. In this view, the use of CCSDS-based protoco...
Tomaso de Cola, Harald Ernst, Mario Marchese
ISCC
2009
IEEE
188views Communications» more  ISCC 2009»
13 years 11 months ago
Distributed Erasure Coding in Data Centric Storage for wireless sensor networks
Abstract—In-network storage of data in wireless sensor networks contributes to reduce the communications inside the network and to favor data aggregation. In this paper, we consi...
Michele Albano, Stefano Chessa