Sciweavers

2399 search results - page 169 / 480
» On Authentication between Human and Computer
Sort
View
JSAC
2006
127views more  JSAC 2006»
15 years 4 months ago
Location-based compromise-tolerant security mechanisms for wireless sensor networks
Abstract-- Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose ...
Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang
IFIP
2009
Springer
15 years 2 months ago
Attack, Solution and Verification for Shared Authorisation Data in TCG TPM
The Trusted Platform Module (TPM) is a hardware chip designed to enable computers achieve greater security. Proof of possession of authorisation values known as authdata is require...
Liqun Chen, Mark Ryan
CORR
2011
Springer
165views Education» more  CORR 2011»
14 years 8 months ago
Finding Deceptive Opinion Spam by Any Stretch of the Imagination
Consumers increasingly go online to rate, review and research products (Jansen, 2010; Litvin et al., 2008). Consequently, websites containing these reviews are becoming targets of...
Myle Ott, Yejin Choi, Claire Cardie, Jeffrey T. Ha...
HAPTICS
2008
IEEE
15 years 10 months ago
Electrotactile Stimulation Based on Strain Energy Density of the Fingertip
Abstract. The shape recognition of an object is important for dexterous manipulation by humans. Therefore, we have developed a haptic display that integrates both electrotactile an...
Katsunari Sato, Hideaki Nii, Naoki Kawakami, Susum...
CGF
2005
141views more  CGF 2005»
15 years 4 months ago
Survey of Real-Time Rendering Techniques for Crowds
Real-time rendering of photo-realistic humans is considerably outside the scope of current consumer-level computer hardware. There are many techniques, which attempt to bridge the...
G. Ryder, A. M. Day