Sciweavers

20175 search results - page 9 / 4035
» Is abstraction the key to computing
Sort
View
ISW
2004
Springer
15 years 5 months ago
Chameleon Hashing Without Key Exposure
Abstract. Chameleon signatures are based on well established hashand-sign paradigm, where a chameleon hash function is used to compute the cryptographic message digest. Chameleon s...
Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim
JCP
2006
120views more  JCP 2006»
15 years 11 days ago
Password-authenticated Key Exchange using Efficient MACs
Abstract-- This paper is concerned with passwordauthenticated key agreement protocols. Designing such protocols represents an interesting challenge since there is no standard way o...
Maurizio Adriano Strangio
141
Voted
ACCV
2010
Springer
14 years 7 months ago
Modeling Sense Disambiguation of Human Pose: Recognizing Action at a Distance by Key Poses
Abstract. We propose a methodology for recognizing actions at a distance by watching the human poses and deriving descriptors that capture the motion patterns of the poses. Human p...
Snehasis Mukherjee, Sujoy Kumar Biswas, Dipti Pras...
ISPA
2005
Springer
15 years 6 months ago
Storage-Optimal Key Sharing with Authentication in Sensor Networks
Abstract. Wireless Sensor Networks are edging closer to widespread feasibility with recent research showing promising results in developing and adapting new mechanisms to suit thei...
Jian Wang, Zhengyou Xia, Lein Harn, Guihai Chen
107
Voted
ICCSA
2009
Springer
15 years 7 months ago
Learning and Predicting Key Web Navigation Patterns Using Bayesian Models
Abstract. The accurate prediction of Web navigation patterns has immense commercial value as the Web evolves into a primary medium for marketing and sales for many businesses. Ofte...
Malik Tahir Hassan, Khurum Nazir Junejo, Asim Kari...