Sciweavers

1610 search results - page 76 / 322
» Identity Based Multisignatures
Sort
View
WACV
2005
IEEE
15 years 7 months ago
Gait Verification Using Probabilistic Methods
In this paper we describe a novel method for gait based identity verification based on Bayesian classification. The verification task is reduced to a two class problem (Client or ...
Alex I. Bazin, Mark S. Nixon
SIGECOM
2010
ACM
157views ECommerce» more  SIGECOM 2010»
15 years 6 months ago
Congestible services and network effects
We study a system where many identical users of a service share a common resource. Each user is sensitive to congestion at the resource, but also experiences a positive network ef...
Ramesh Johari, Sunil Kumar
FC
2006
Springer
147views Cryptology» more  FC 2006»
15 years 5 months ago
Timed-Release and Key-Insulated Public Key Encryption
In this paper we consider two security notions related to Identity Based Encryption: Key-insulated public key encryption, introduced by Dodis, Katz, Xu and Yung; and Timed-Release ...
Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan...
DLT
2008
15 years 3 months ago
Hierarchies of Piecewise Testable Languages
The classes of languages which are boolean combinations of languages of the form A a1A a2A . . . A a A , where a1, . . . , a A, k , for a fixed k 0, form a natural hierarchy wit...
Ondrej Klíma, Libor Polák
NIPS
2008
15 years 3 months ago
Hierarchical Fisher Kernels for Longitudinal Data
We develop new techniques for time series classification based on hierarchical Bayesian generative models (called mixed-effect models) and the Fisher kernel derived from them. A k...
Zhengdong Lu, Todd K. Leen, Jeffrey Kaye