Sciweavers

947 search results - page 113 / 190
» HMM-Based Trust Model
Sort
View
99
Voted
ICISC
2001
156views Cryptology» more  ICISC 2001»
15 years 2 months ago
A Distributed Light-Weight Authentication Model for Ad-hoc Networks
Abstract. In this work we present a security model for low-value transactions in ad-hoc networks in which we focus on authentication since this is the core requirement for commerci...
André Weimerskirch, Gilles Thonet
ICWS
2007
IEEE
15 years 2 months ago
A Model to support SPKI Federations management through XKMS
The purpose of the XML Key Management Specification (XKMS) is to facilitate the use of a Public Key Infrastructure (PKI) by transferring the complexity associated with PKI to a t...
Michelle S. Wangham, Emerson Ribeiro de Mello, Jon...
BMVC
2000
15 years 2 months ago
Quantifying Ambiguities in Inferring Vector-Based 3D Models
This paper presents a framework for directly addressing issues arising from self-occlusions and ambiguities due to the lack of depth information in vector-based representations. V...
Eng-Jon Ong, Shaogang Gong
101
Voted
ITCC
2003
IEEE
15 years 6 months ago
A Federated Model for Secure Web-Based Videoconferencing
This paper describes efforts underway within Internet2 to create a secure federated IP based videoconferencing model. The objective is to create an environment that is user-friend...
Douglas C. Sicker, Ameet Kulkarni, Anand Chavali, ...
ACSAC
1997
IEEE
15 years 4 months ago
A Reference Model for Firewall Technology
This paper concentrates on one particular aspect of providing communication security: rewalls between domains of trust. We argue that signaling support for providing scalable secu...
Christoph L. Schuba, Eugene H. Spafford