Sciweavers

13277 search results - page 2565 / 2656
» An Approach to Clustering Abstracts
Sort
View
ICB
2007
Springer
156views Biometrics» more  ICB 2007»
15 years 6 months ago
Robust Extraction of Secret Bits from Minutiae
Abstract. Our goal is to extract consistent bits from the same fingerprint in a noisy environment. Such bits can then be used as a secret key in several cryptographic applications...
Ee-Chien Chang, Sujoy Roy
219
Voted
ICCS
2007
Springer
15 years 6 months ago
High Quality Surface Mesh Generation for Multi-physics Bio-medical Simulations
Abstract. Manual surface reconstruction is still an everyday practice in applications involving complex irregular domains necessary for modeling biological systems. Rapid developme...
Dominik Szczerba, Robert H. P. McGregor, Gá...
88
Voted
ICFEM
2007
Springer
15 years 6 months ago
Model Checking with SAT-Based Characterization of ACTL Formulas
Bounded semantics of LTL with existential interpretation and that of ECTL (the existential fragment of CTL), and the characterization of these existentially interpreted properties ...
Wenhui Zhang
IH
2007
Springer
15 years 6 months ago
Security of Invertible Media Authentication Schemes Revisited
Abstract. Dittmann, Katzenbeisser, Schallhart and Veith (IACR ePrint 2004) introduced the notion of invertible media authentication schemes, embedding authentication data in media ...
Daniel Dönigus, Stefan Endler, Marc Fischlin,...
102
Voted
ISW
2007
Springer
15 years 6 months ago
Enabling Fairer Digital Rights Management with Trusted Computing
Abstract. Today, digital content is routinely distributed over the Internet, and consumed in devices based on open platforms. However, on open platforms users can run exploits, rec...
Ahmad-Reza Sadeghi, Marko Wolf, Christian Stü...
« Prev « First page 2565 / 2656 Last » Next »