Sciweavers

1610 search results - page 113 / 322
» Identity Based Multisignatures
Sort
View
130
Voted
CORR
2010
Springer
114views Education» more  CORR 2010»
15 years 3 months ago
Integrating identity-based cryptography in IMS service authentication
Nowadays, the IP Multimedia Subsystem (IMS) is a promising research field. Many ongoing works related to the security and the performances of its employment are presented to the r...
Mohamed Abid, Songbo Song, Hassnaa Moustafa, Hossa...
CVPR
2003
IEEE
15 years 8 months ago
Analyzing Appearance and Contour Based Methods for Object Categorization
Object recognition has reached a level where we can identify a large number of previously seen and known objects. However, the more challenging and important task of categorizing ...
Bastian Leibe, Bernt Schiele
ARC
2010
Springer
178views Hardware» more  ARC 2010»
15 years 9 months ago
An Analysis of Delay Based PUF Implementations on FPGA
Physical Unclonable Functions promise cheap, efficient, and secure identification and authentication of devices. In FPGA devices, PUFs may be instantiated directly from FPGA fabri...
Sergey Morozov, Abhranil Maiti, Patrick Schaumont
122
Voted
CEC
2007
IEEE
15 years 9 months ago
On some symmetry based validity indices
—Identification of the correct number of clusters and the corresponding partitioning are two important considerations in clustering. In this paper, a newly developed point symme...
Sriparna Saha, Sanghamitra Bandyopadhyay
IWDW
2005
Springer
15 years 8 months ago
ViWiD : Visible Watermarking Based Defense Against Phishing
In this paper, we present a watermarking based approach, and its implementation, for mitigating phishing attacks - a form of web based identity theft. ViWiD is an integrity check m...
Mercan Topkara, Ashish Kamra, Mikhail J. Atallah, ...