Sciweavers

138 search results - page 19 / 28
» A Proposal of Short Proxy Signature using Pairing
Sort
View
HICSS
2007
IEEE
112views Biometrics» more  HICSS 2007»
15 years 8 months ago
E-Risk Management through Self Insurance: An Option Model
e-business organizations are under constant threat of their business being disrupted by hackers, viruses and a host of malicious attackers. This would lead to loses to the tune of...
Arunabha Mukhopadhyay, Binay Bhushan, Debashis Sah...
CISS
2008
IEEE
15 years 8 months ago
Interference management for multiuser two-way relaying
—We consider a multiuser two-way relay network where multiple pairs of users communicate with their pre-assigned partners, using a common intermediate relay node, in a twophase c...
Min Chen, Aylin Yener
CRYPTO
2003
Springer
132views Cryptology» more  CRYPTO 2003»
15 years 7 months ago
On Cryptographic Assumptions and Challenges
We deal with computational assumptions needed in order to design secure cryptographic schemes. We suggest a classi£cation of such assumptions based on the complexity of falsifying...
Moni Naor
AVBPA
2005
Springer
296views Biometrics» more  AVBPA 2005»
15 years 7 months ago
Exploring Similarity Measures for Biometric Databases
Currently biometric system performance is evaluated in terms of its FAR and FRR. The accuracy expressed in such a manner depends on the characteristics of the dataset on which the ...
Praveer Mansukhani, Venu Govindaraju
80
Voted
ICASSP
2010
IEEE
15 years 2 months ago
Tracking encrypted VoIP calls via robust hashing of network flows
In this work we propose a Voice over IP (VoIP) call tracking scheme based on robust hashing of VoIP flows. In the proposed scheme the audio content of a possibly encrypted VoIP ï...
Baris Coskun, Nasir D. Memon