Sciweavers

24529 search results - page 246 / 4906
» Computing on Authenticated Data
Sort
View
139
Voted
ACSAC
2001
IEEE
15 years 7 months ago
Trustworthiness in Distributed Electronic Healthcare Records-Basis for Shared Care
Shared Care is the common answer to the challenge for improving health system's quality and efficiency. This development must be accompanied by implementing shared care infor...
Bernd Blobel
125
Voted
CMS
2003
108views Communications» more  CMS 2003»
15 years 5 months ago
Towards an IPv6-Based Security Framework for Distributed Storage Resources
Abstract. Some security problems can be often solved through authorization rather than authentication. Furthermore, certificate-based authorization approach can alleviate usual dr...
Alessandro Bassi, Julien Laganier
138
Voted
ADHOC
2006
95views more  ADHOC 2006»
15 years 3 months ago
LHAP: A lightweight network access control protocol for ad hoc networks
Most ad hoc networks do not implement any network access control, leaving these networks vulnerable to resource consumption attacks where a malicious node injects packets into the ...
Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jaj...
127
Voted
PR
2008
137views more  PR 2008»
15 years 3 months ago
Cancellable biometrics and annotations on BioHash
Lately, the once powerful one-factor authentication which is based solely on either password, token or biometric approach, appears to be insufficient in addressing the challenges ...
Andrew Beng Jin Teoh, Yip Wai Kuan, Sangyoun Lee
151
Voted
ICB
2009
Springer
173views Biometrics» more  ICB 2009»
15 years 1 months ago
Bayesian Networks to Combine Intensity and Color Information in Face Recognition
We present generative models dedicated to face recognition. Our models consider data extracted from color face images and use Bayesian Networks to model relationships between diffe...
Guillaume Heusch, Sébastien Marcel