Sciweavers

10044 search results - page 158 / 2009
» Authentication in Wireless Networks
Sort
View
CVPR
2008
IEEE
15 years 1 months ago
Demosaicking recognition with applications in digital photo authentication based on a quadratic pixel correlation model
Most digital still color cameras use a single electronic sensor (CCD or CMOS) overlaid with a color filter array. At each pixel location only one color sample is taken, and the ot...
Yizhen Huang, Yangjing Long
CVIU
2008
118views more  CVIU 2008»
14 years 11 months ago
Multimodal person authentication using speech, face and visual speech
This paper presents a method for automatic multimodal person authentication using speech, face and visual speech modalities. The proposed method uses the motion information to loc...
S. Palanivel, B. Yegnanarayana
ISCI
2010
146views more  ISCI 2010»
14 years 9 months ago
Simulatable certificateless two-party authenticated key agreement protocol
Key agreement (KA) allows two or more users to negotiate a secret session key among them over an open network. Authenticated key agreement (AKA) is a KA protocol enhanced to preve...
Lei Zhang 0009, Futai Zhang, Qianhong Wu, Josep Do...
WINET
2010
113views more  WINET 2010»
14 years 10 months ago
Designing multihop wireless backhaul networks with delay guarantees
— As wireless access technologies improve in data rates, the problem focus is shifting towards providing adequate backhaul from the wireless access points to the Internet. Existi...
Girija J. Narlikar, Gordon T. Wilfong, Lisa Zhang
ICIP
1994
IEEE
16 years 1 months ago
Adaptive Video Coding for Mobile Wireless Networks
Benjamin Belzer, Judy Liao, John D. Villasenor