Sciweavers

1610 search results - page 205 / 322
» Identity Based Multisignatures
Sort
View
106
Voted
CCS
2006
ACM
15 years 4 months ago
Attribute-based encryption for fine-grained access control of encrypted data
As more sensitive data is shared and stored by third-party sites on the Internet, there will be a need to encrypt data stored at these sites. One drawback of encrypting data, is t...
Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Wate...
100
Voted
AVBPA
2003
Springer
146views Biometrics» more  AVBPA 2003»
15 years 4 months ago
Dental Biometrics: Human Identification Using Dental Radiographs
Abstract. The goal of forensic dentistry is to identify people based on their dental records, mainly as radiograph images. In this paper we attempt to set forth the foundations of ...
Anil K. Jain, Hong Chen, Silviu Minut
118
Voted
WSC
2008
15 years 3 months ago
Measuring the effectiveness of the s-metric to produce better network models
Recent research has shown that while many complex networks follow a power-law distribution for their node degrees, it is not sufficient to model these networks based only on their...
Isabel Beichl, Brian Cloteaux
CIARP
2008
Springer
15 years 2 months ago
Measuring the Related Properties of Linearity and Elongation of Point Sets
The concept of elongation is generally well understood. However, there is no clear, precise, mathematical definition of elongation in any dictionary we could find. We propose that ...
Milos Stojmenovic, Amiya Nayak
SSWMC
2004
15 years 2 months ago
Security for biometric data
Biometric authentication, i.e. verifying the claimed identity of a person based on physiological characteristics or behavioral traits, has the potential to contribute to both priv...
Claus Vielhauer, Ton Kalker