Sciweavers

1610 search results - page 71 / 322
» Identity Based Multisignatures
Sort
View
PERCOM
2010
ACM
14 years 11 months ago
Privacy-preserving admission to mobile peer-to-peer groups
Mobile peer-to-peer groups, which do not require any pre-deployed infrastructure or trusted centralized authority are valuable for a variety of collaborative applications. This wor...
Mark Manulis
BIOSIG
2009
102views Biometrics» more  BIOSIG 2009»
14 years 11 months ago
SAMLizing the European Citizen Card
: While the use of Federated Identity Management and Single Sign-On based on the Security Assertion Markup Language (SAML) standards becomes more and more important, there are quit...
Jan Eichholz, Detlef Hühnlein, Jörg Schw...
DSL
2009
14 years 11 months ago
A Haskell Hosted DSL for Writing Transformation Systems
KURE is a Haskell hosted Domain Specific Language (DSL) for writing transformation systems based on rewrite strategies. When writing transformation systems, a significant amount of...
Andy Gill
115
Voted
ICIP
2009
IEEE
14 years 11 months ago
A new representation method of head images for head pose estimation
In this paper, a discriminative representation method of head images is proposed, which is based on parts and poses for identity-independent head pose estimation. Head images are ...
Xiangyang Liu, Hongtao Lu, Heng Luo
AIL
2010
60views more  AIL 2010»
14 years 11 months ago
Network-based filtering for large email collections in E-Discovery
The information overload in E-Discovery proceedings makes reviewing expensive and it increases the risk of failure to produce results on time and consistently. New interactive tec...
Hans Henseler