Sciweavers

24529 search results - page 236 / 4906
» Computing on Authenticated Data
Sort
View
ICICS
1997
Springer
15 years 7 months ago
Stateless connections
We describe a secure transformation of stateful connections or parts of them into stateless ones by attaching the state information to the messages. Secret-key cryptography is used...
Tuomas Aura, Pekka Nikander
BIOSIG
2008
159views Biometrics» more  BIOSIG 2008»
15 years 5 months ago
Template Protection for PCA-LDA-based 3D Face Recognition Systems
: Authentication based on biometrics became significantly important over the last years. Privacy and security concerns arise by the extensive deployment of biometrics. The used bio...
Daniel Hartung
117
Voted
SCANGIS
2001
15 years 4 months ago
Improving relief classification with contextual merging
Automatic classification of relief attributes into meaningful morphological units has a great potential within the field of geomorphology. When applying common classification algor...
Bård Romstad
139
Voted
APWEB
2005
Springer
15 years 9 months ago
An Updates Dissemination Protocol for Read-Only Transaction Processing in Mobile Real-Time Computing Environments
Data management issues in mobile computing environments have got lots of concerns of relevant researchers. Among these research topics, data broadcast has been extensively investig...
Guohui Li, Hongya Wang, Jixiong Chen, Yingyuan Xia...
GI
2009
Springer
15 years 8 months ago
Self-monitoring for Computer Users
: We are presenting a tool for collecting and analysing computer usage data. The observed data are locally used by the user to self-monitor and self-reflect her behaviour, decontro...
Maren Scheffel, Martin Friedrich, Marco Jahn, Uwe ...