Sciweavers

6574 search results - page 87 / 1315
» Current Signatures: Application
Sort
View
ISVC
2007
Springer
15 years 7 months ago
Iris Recognition: An Entropy-Based Coding Strategy Robust to Noisy Imaging Environments
Abstract. The iris is currently accepted as one of the most accurate traits for biometric purposes. However, for the sake of accuracy, iris recognition systems rely on good quality...
Hugo Proença, Luís A. Alexandre
103
Voted
PROVSEC
2007
Springer
15 years 6 months ago
Stronger Security of Authenticated Key Exchange
In this paper we study security definitions for authenticated key exchange (AKE) protocols. We observe that there are several families of attacks on AKE protocols that lie outsid...
Brian A. LaMacchia, Kristin Lauter, Anton Mityagin
VISUALIZATION
1997
IEEE
15 years 5 months ago
The contour spectrum
We introduce the contour spectrum, a user interface component that improves qualitative user interaction and provides real-time exact quanti cation in the visualization of isocont...
Chandrajit L. Bajaj, Valerio Pascucci, Daniel Schi...
ACSAC
2004
IEEE
15 years 4 months ago
Static Analyzer of Vicious Executables (SAVE)
Software security assurance and malware (trojans, worms, and viruses, etc.) detection are important topics of information security. Software obfuscation, a general technique that ...
Andrew H. Sung, Jianyun Xu, Patrick Chavez, Sriniv...
124
Voted
TWC
2008
122views more  TWC 2008»
15 years 19 days ago
TSVC: timed efficient and secure vehicular communications with privacy preserving
In this paper, we propose a Timed Efficient and Secure Vehicular Communication (TSVC) scheme with privacy preservation, which aims at minimizing the packet overhead in terms of sig...
Xiaodong Lin, Xiaoting Sun, Xiaoyu Wang, Chenxi Zh...