Sciweavers

1610 search results - page 221 / 322
» Identity Based Multisignatures
Sort
View
109
Voted
SOSP
2003
ACM
15 years 9 months ago
Decentralized user authentication in a global file system
The challenge for user authentication in a global file system is allowing people to grant access to specific users and groups in remote administrative domains, without assuming ...
Michael Kaminsky, George Savvides, David Mazi&egra...
104
Voted
INFOCOM
2009
IEEE
15 years 7 months ago
Identifying High Cardinality Internet Hosts
—The Internet host cardinality, defined as the number of distinct peers that an Internet host communicates with, is an important metric for profiling Internet hosts. Some examp...
Jing Cao, Yu Jin, Aiyou Chen, Tian Bu, Zhi-Li Zhan...
118
Voted
MOBISEC
2009
Springer
15 years 7 months ago
Filtering SPAM in P2PSIP Communities with Web of Trust
Spam is a dominant problem on email systems today. One of the reasons is the lack of infrastructure for security and trust. As Voice over IP (VoIP) communication becomes increasing...
Juho Heikkilä, Andrei Gurtov
CISS
2008
IEEE
15 years 7 months ago
Compressed channel sensing
—Reliable wireless communications often requires accurate knowledge of the underlying multipath channel. This typically involves probing of the channel with a known training wave...
Waheed Uz Zaman Bajwa, Jarvis Haupt, Gil M. Raz, R...
108
Voted
FGR
2008
IEEE
180views Biometrics» more  FGR 2008»
15 years 7 months ago
Image-set matching using a geodesic distance and cohort normalization
An image-set based face recognition algorithm is proposed that exploits the full geometrical interpretation of Canonical Correlation Analysis (CCA). CCA maximizes the correlation ...
Yui Man Lui, J. Ross Beveridge, Bruce A. Draper, M...