• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 499
Next 10 →

A Classification Scheme for Multi-Sensory Augmented Reality

by Robert W. Lindeman, Haruo Noma - Proc. of ACM Virtual Reality Software and Technology (VRST) 2007
"... We present a new classification framework for describing augmented reality (AR) applications based on where the mixing of real and computer-generated stimuli takes place. In addition to "classical " visual AR techniques, such as optical-see-through and video-see-through AR, our fra ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
We present a new classification framework for describing augmented reality (AR) applications based on where the mixing of real and computer-generated stimuli takes place. In addition to "classical " visual AR techniques, such as optical-see-through and video-see-through AR, our

A mobile host protocol supporting route optimization and authentication

by Andrew Myles, David B. Johnson, Charles Perkins - IEEE Journal on Selected Areas in Communications , 1995
"... Abstract- Host mobility is becoming an important issue due to the recent proliferation of notebook and palmtop computers, the development of wireless network interfaces, and the growth in global internetworking. This paper describes the design and implementation of a mobile host protocol, called the ..."
Abstract - Cited by 63 (3 self) - Add to MetaCart
hosts communicating with the mobile host. IMHP features route optimization and integrated authentication of all management packets. Route optimization allows a node to cache the location of a mobile host and to send future packets directly to that mobile host. By authenticating all management packets

Pass-thoughts: Authenticating with our minds

by Julie Thorpe - In Proceedings of New Security Paradigns Workshop. Lake Arrowhead , 2005
"... We present a novel idea for user authentication that we call pass-thoughts. Recent advances in Brain-Computer Interface (BCI) technology indicate that there is potential for a new type of human-computer interaction: a user transmitting thoughts directly to a computer. The goal of a pass-thought syst ..."
Abstract - Cited by 26 (1 self) - Add to MetaCart
We present a novel idea for user authentication that we call pass-thoughts. Recent advances in Brain-Computer Interface (BCI) technology indicate that there is potential for a new type of human-computer interaction: a user transmitting thoughts directly to a computer. The goal of a pass

OTP Authentication Module and Authentication Certificate Based User Authenticating Technique for Direct Access to Home Network and Resource Management

by Jung-oh Park, Sang-geun Kim
"... Home network service industry, the driving force for future national development and new changes, may be deemed to comprehend tremendous potential of future development, however as home network services proliferate and various types of home network services emerge, home network services are growing ..."
Abstract - Add to MetaCart
Home network service industry, the driving force for future national development and new changes, may be deemed to comprehend tremendous potential of future development, however as home network services proliferate and various types of home network services emerge, home network services are growing

Multisensory processing for speech enhancement and magnitude-normalized spectra for speech modeling

by Amarnag Subramanya , Zhengyou Zhang , Zicheng Liu , Alex Acero - Speech Communication , 2008
"... Abstract In this paper, we tackle the problem of speech enhancement from two fronts: speech modeling and multisensory input. We present a new speech model based on statistics of magnitude-normalized complex spectra of speech signals. By performing magnitude normalization, we are able to get rid of ..."
Abstract - Cited by 6 (0 self) - Add to MetaCart
Abstract In this paper, we tackle the problem of speech enhancement from two fronts: speech modeling and multisensory input. We present a new speech model based on statistics of magnitude-normalized complex spectra of speech signals. By performing magnitude normalization, we are able to get rid

Enabling public auditability and data dynamics for storage security in cloud computing

by Qian Wang, Student Member, Cong Wang, Student Member, Kui Ren, Wenjing Lou, Senior Member, Jin Li - IEEE Trans. Parallel Distrib. Syst , 2011
"... Abstract—Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. This unique paradigm brings about many ..."
Abstract - Cited by 114 (2 self) - Add to MetaCart
many new security challenges, which have not been well understood. This work studies the problem of ensuring the integrity of data storage in Cloud Computing. In particular, we consider the task of allowing a third party auditor (TPA), on behalf of the cloud client, to verify the integrity

Reverse authentication in financial transactions

by A. W. Roscoe, Chen Bangdao
"... New families of protocol, based on communication over humanbased side channels, permit secure pairing or group formation in ways that no party has to prove its name, which is particularly suitable for authentication on mobile phones. Rather, individuals are able to hook up devices in their possessio ..."
Abstract - Cited by 2 (1 self) - Add to MetaCart
New families of protocol, based on communication over humanbased side channels, permit secure pairing or group formation in ways that no party has to prove its name, which is particularly suitable for authentication on mobile phones. Rather, individuals are able to hook up devices

Sensor-based User Authentication

by He Wang , Dimitrios Lymberopoulos , Jie Liu
"... Abstract. We study the feasibility of leveraging the sensors embedded on mobile devices to enable a user authentication mechanism that is easy for users to perform, but hard for attackers to bypass. The proposed approach lies on the fact that users perform gestures in a unique way that depends on h ..."
Abstract - Add to MetaCart
and false reject rates. Attackers that directly observe the true user authenticating on a device, can successfully bypass authentication only 3% of the time.

New Real Time Multicast Authentication Protocol

by Riham Abdellatif, Heba K. Aslan, Salwa H. Elramly - International Journal of Network Security
"... Multicast gives professional large-scale content distribution by providing an efficient transport mechanism for one-to-many and many-to-many communications. There is a number of security issues in multicast communication directly related to the specific nature of multicast. In our paper, we concentr ..."
Abstract - Cited by 4 (1 self) - Add to MetaCart
Multicast gives professional large-scale content distribution by providing an efficient transport mechanism for one-to-many and many-to-many communications. There is a number of security issues in multicast communication directly related to the specific nature of multicast. In our paper, we

Anonymous Authentication with Shared Secrets

by Martin Hirt, Ueli Maurer, Arpita Patra, Pavel Raykov
"... Abstract. Anonymity and authenticity are both important yet often conflicting security goals in a wide range of applications. On the one hand for many applications (say for access control) it is crucial to be able to verify the identity of a given legitimate party (a.k.a. entity au-thentication). Al ..."
Abstract - Add to MetaCart
statement of constructive cryptography and can there-fore be directly used in any higher-level context. Next we demonstrate several simple protocols for realizing these systems, at times relying on a new type of (probabilistic) Message Authentication Code (MAC) called key indistinguishable (KI) MACs
Next 10 →
Results 11 - 20 of 499
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University