Sciweavers

247 search results - page 7 / 50
» Session-Key Generation Using Human Passwords Only
Sort
View
CCS
2005
ACM
15 years 3 months ago
Modeling insider attacks on group key-exchange protocols
Protocols for authenticated key exchange (AKE) allow parties within an insecure network to establish a common session key which can then be used to secure their future communicati...
Jonathan Katz, Ji Sun Shin
DRM
2007
Springer
15 years 3 months ago
Randomized radon transforms for biometric authentication via fingerprint hashing
We present a new technique for generating biometric fingerprint hashes, or summaries of information contained in human fingerprints. Our method calculates and aggregates various...
Mariusz H. Jakubowski, Ramarathnam Venkatesan
107
Voted
ECCV
2000
Springer
15 years 11 months ago
Stochastic Tracking of 3D Human Figures Using 2D Image Motion
A probabilistic method for tracking 3D articulated human figures in monocular image sequences is presented. Within a Bayesian framework, we define a generative model of image appea...
Hedvig Sidenbladh, Michael J. Black, David J. Flee...
79
Voted
AVSS
2005
IEEE
15 years 3 months ago
Clustering of human actions using invariant body shape descriptor and dynamic time warping
We propose a human action clustering method based on a 3D representation of the body in terms of volumetric coordinates. Features representing body postures are extracted directly...
Massimiliano Pierobon, Marco Marcon, Augusto Sarti...
IROS
2009
IEEE
138views Robotics» more  IROS 2009»
15 years 4 months ago
Using eigenposes for lossless periodic human motion imitation
— Programming a humanoid robot to perform an action that takes the robot’s complex dynamics into account is a challenging problem. Traditional approaches typically require high...
Rawichote Chalodhorn, Rajesh P. N. Rao