Sciweavers

1610 search results - page 151 / 322
» Identity Based Multisignatures
Sort
View
ACSAC
2000
IEEE
15 years 7 months ago
A Self-Extension Monitoring for Security Management
In the coming age of information warfare, information security patterns take on a more offensive than defensive stance [1]. However, most existing security systems remain passive ...
Heejin Jang, Sangwook Kim
FC
1999
Springer
160views Cryptology» more  FC 1999»
15 years 7 months ago
Anonymous Authentication of Membership in Dynamic Groups
Abstract. We present a series of protocols for authenticating an individual’s membership in a group without revealing that individual’s identity and without restricting how the...
Stuart E. Schechter, Todd Parnell, Alexander J. Ha...
128
Voted
ACCV
1998
Springer
15 years 7 months ago
Integrating Faces and Fingerprints for Personal Identification
An automatic personal identification system based solely on fingerprints or faces is often not able to meet the system performance requirements. Face recognition is fast but not ex...
Lin Hong, Anil K. Jain
COSIT
1997
Springer
115views GIS» more  COSIT 1997»
15 years 7 months ago
Qualitative Representation of Change
Current geographic information systems (GISs) have been designed for querying and maintaining static databases representing static phenomena and give little support to those users ...
Kathleen Hornsby, Max J. Egenhofer
CSB
2004
IEEE
103views Bioinformatics» more  CSB 2004»
15 years 7 months ago
Identifying MicroRNAs in Plant Genomes
The ability to control gene expression during development in plants could be used for improving crop yields, resistance to disease, and environmental adaptability. It has been sug...
Christopher Maher, Marja Timmermans, Lincoln Stein...