Sciweavers

858 search results - page 134 / 172
» User Authentication in Sensor Networks
Sort
View
IPSN
2007
Springer
15 years 4 months ago
Harbor: software-based memory protection for sensor nodes
Many sensor nodes contain resource constrained microcontrollers where user level applications, operating system components, and device drivers share a single address space with no...
Ram Kumar, Eddie Kohler, Mani B. Srivastava
CSE
2009
IEEE
15 years 4 months ago
A Network-Aware Distributed Membership Protocol for Collaborative Defense
— To counteract current trends in network malware, distributed solutions have been developed that harness the power of collaborative end-host sensors. While these systems greatly...
David Zage, Carl Livadas, Eve M. Schooler
CVPR
2000
IEEE
15 years 12 months ago
Multimodal Speaker Detection Using Error Feedback Dynamic Bayesian Networks
Design and development of novel human-computer interfaces poses a challenging problem: actions and intentions of users have to be inferred from sequences of noisy and ambiguous mu...
Vladimir Pavlovic, James M. Rehg, Ashutosh Garg, T...
ICDCSW
2005
IEEE
15 years 3 months ago
Adding Context Information to Digital Photos
In a user centered design process, we investigate what context information may be used to augment digital photos with additional meta information. We describe our initial findings...
Paul Holleis, Matthias Kranz, Marion Gall, Albrech...
ACSAC
2009
IEEE
15 years 4 months ago
Privacy through Noise: A Design Space for Private Identification
To protect privacy in large systems, users must be able to authenticate against a central server without disclosing their identity to the network. Private identification protocols ...
Karsten Nohl, David Evans