Sciweavers

308 search results - page 57 / 62
» A New Model for Public-Key Authentication
Sort
View
GLOBECOM
2007
IEEE
15 years 6 months ago
Power-Modulated Challenge-Response Schemes for Verifying Location Claims
—Location information should be verifiable in order to support new computing and information services. In this paper, we adapt the classical challenge-response method for authen...
Yu Zhang, Zang Li, Wade Trappe
INFOCOM
2007
IEEE
15 years 6 months ago
Scalable Secure Bidirectional Group Communication
— Many network applications are based on a group communications model where one party sends messages to a large number of authorized recipients and/or receives messages from mult...
Yitao Duan, John F. Canny
ISDA
2006
IEEE
15 years 5 months ago
Enhancing 3D Face Recognition By Mimics Segmentation
In this paper, we present a novel approach for face recognition and authentication based on dimensional surface matching. While most of existing methods use facial intensity image...
Boulbaba Ben Amor, Mohsen Ardabilian, Liming Chen
ISCC
2005
IEEE
132views Communications» more  ISCC 2005»
15 years 5 months ago
A Reputation-Based Trust Mechanism for Ad Hoc Networks
— The main characterisrics of ad hoc networks are the lack of predefined infrastructure and the dynamic topology. These characteristics present some new security vulnerabilities...
Yacine Rebahi, Vicente E. Mujica V, Dorgham Sisale...
AVBPA
2001
Springer
146views Biometrics» more  AVBPA 2001»
15 years 3 months ago
Robust Face Detection Using the Hausdorff Distance
Abstract. The localization of human faces in digital images is a fundamental step in the process of face recognition. This paper presents a shape comparison approach to achieve fas...
Oliver Jesorsky, Klaus J. Kirchberg, Robert Frisch...