Sciweavers

6195 search results - page 1133 / 1239
» Cloud Computing Security
Sort
View
156
Voted
CBMS
2006
IEEE
15 years 10 months ago
Dorian: Grid Service Infrastructure for Identity Management and Federation
Identity management and federation is becoming an ever present problem in large multi-institutional environments. By their nature, Grids span multiple institutional administration...
Stephen Langella, Scott Oster, Shannon Hastings, F...
GLOBECOM
2006
IEEE
15 years 10 months ago
RIM: Router Interface Marking for IP Traceback
—Distributed Denial-of-Service (DDoS) attacks have become a major threat to the Internet. As a countermeasure against DDoS attacks, IP traceback schemes identify the network path...
Ruiliang Chen, Jung Min Park, Randolph Marchany
186
Voted
HAPTICS
2006
IEEE
15 years 10 months ago
Haptic-Based Biometrics: A Feasibility Study
Biometric systems identify users based on behavioral or physiological characteristics. The advantages of such systems over traditional authentication methods such as passwords are...
Mauricio Orozco Trujillo, Yednek Asfaw, Shervin Sh...
ICMCS
2006
IEEE
116views Multimedia» more  ICMCS 2006»
15 years 10 months ago
SIKAS: A Scalable Distributed Key Management Scheme for Dynamic Collaborative Groups
The increasing popularity of distributed and collaborative applications prompts the need for secure communication in collaborative groups. Some distributed collaborative key manag...
Jiang Zhang, Jian-Guang Luo, Bin Li, Shiqiang Yang
137
Voted
ICMCS
2006
IEEE
371views Multimedia» more  ICMCS 2006»
15 years 10 months ago
Automatic Counting of Interacting People by using a Single Uncalibrated Camera
Automatic counting of people, entering or exiting a region of interest, is very important for both business and security applications. This paper introduces an automatic and robus...
Senem Velipasalar, Ying-li Tian, Arun Hampapur
« Prev « First page 1133 / 1239 Last » Next »