Sciweavers

2399 search results - page 40 / 480
» On Authentication between Human and Computer
Sort
View
JDCTA
2010
347views more  JDCTA 2010»
14 years 4 months ago
Application of 3D body scanning technology to human measurement for clothing Fit
Complications with garment sizing and poor fit inconvenience many consumers who become dissatisfied with such provision on the high street. It is evident that human measurement an...
Phoebe R. Apeagyei
CONEXT
2008
ACM
14 years 11 months ago
A security plane for publish/subscribe based content oriented networks
The publish/subscribe communication paradigm is an appealing mechanism for efficient content retrieval due to the decoupling of data sources and consumers. However, the location d...
Walter Wong, Fábio Luciano Verdi, Maur&iacu...
ICDE
2011
IEEE
271views Database» more  ICDE 2011»
14 years 1 months ago
Authentication of moving kNN queries
— A moving kNN query continuously reports the k nearest neighbors of a moving query point. In addition to the query result, a service provider that evaluates moving queries often...
Man Lung Yiu, Eric Lo, Duncan Yung
MOBICOM
1996
ACM
15 years 1 months ago
Security on the Move: Indirect Authentication using Kerberos
Even as mobile computing and network computing are gaining momentum, Internet security is sharing the spotlight. Security and authentication on open networks is already a difficul...
Armando Fox, Steven D. Gribble
IPPS
2006
IEEE
15 years 3 months ago
The interleaved authentication for filtering false reports in multipath routing based sensor networks
In this paper, we consider filtering false reports in braided multipath routing sensor networks. While multipath routing provides better resilience to various faults in sensor ne...
Youtao Zhang, Jim Yang, Hai T. Vu