Sciweavers

348 search results - page 41 / 70
» Secure Computation on the Web: Computing without Simultaneou...
Sort
View
CCS
2009
ACM
15 years 8 months ago
A practical property-based bootstrap architecture
Binary attestation, as proposed by the Trusted Computing Group (TCG), is a pragmatic approach for software integrity protection and verification. However, it has also various sho...
René Korthaus, Ahmad-Reza Sadeghi, Christia...
APCHI
2004
IEEE
15 years 5 months ago
Real-World Oriented Access Control Method with a Displayed Password
Abstract. Access control within a ubiquitous networking environment is a critical issue. Traditional access control methods have mainly relied on the authentication of registered u...
Yuji Ayatsuka, Michimune Kohno, Jun Rekimoto
ICIP
2009
IEEE
16 years 3 months ago
Age Regression From Faces Using Random Forests
Predicting the age of a person through face image analysis holds the potential to drive an extensive array of real world applications from human computer interaction and security ...
146
Voted
CORR
2011
Springer
195views Education» more  CORR 2011»
14 years 9 months ago
Context-aware Authorization in Highly Dynamic Environments
Highly dynamic computing environments, like ubiquitous and pervasive computing environments, require frequent adaptation of applications. Context is a key to adapt suiting user ne...
Jean-Yves Tigli, Stephane Lavirotte, Gaëtan R...
APCHI
1998
IEEE
15 years 6 months ago
Claymore: Augmented Direct Manipulation of Three-Dimensional Objects
This paper describes a method for manipulating a threedimensional object without considering conventional three independent orthogonal views. We apply the direct manipulation to o...
Hideki Mitsunobu, Takashi Oshiba, Jiro Tanaka