Sciweavers

123 search results - page 15 / 25
» New attacks on SARI image authentication system
Sort
View
TIFS
2010
140views more  TIFS 2010»
14 years 5 months ago
An Evaluation of Video-to-Video Face Verification
Person recognition using facial features, e.g., mug-shot images, has long been used in identity documents. However, due to the widespread use of web-cams and mobile devices embedd...
Norman Poh, Chi-Ho Chan, Josef Kittler, Séb...
CCS
2011
ACM
13 years 11 months ago
AmazonIA: when elasticity snaps back
Cloud Computing is an emerging technology promising new business opportunities and easy deployment of web services. Much has been written about the risks and benefits of cloud co...
Sven Bugiel, Stefan Nürnberger, Thomas Pö...
USS
2008
15 years 1 months ago
Lest We Remember: Cold Boot Attacks on Encryption Keys
Contrary to popular assumption, DRAMs used in most modern computers retain their contents for several seconds after power is lost, even at room temperature and even if removed fro...
J. Alex Halderman, Seth D. Schoen, Nadia Heninger,...
JSAC
2011
142views more  JSAC 2011»
14 years 6 months ago
A Distributed Key Management Framework with Cooperative Message Authentication in VANETs
Abstract—In this paper, we propose a distributed key management framework based on group signature to provision privacy in vehicular ad hoc networks (VANETs). Distributed key man...
Yong Hao, Yu Cheng, Chi Zhou, Wei Song
ICB
2007
Springer
124views Biometrics» more  ICB 2007»
15 years 5 months ago
Face Authentication with Salient Local Features and Static Bayesian Network
In this paper, the problem of face authentication using salient facial features together with statistical generative models is adressed. Actually, classical generative models, and ...
Guillaume Heusch, Sébastien Marcel