Results 1 to 10 of about 122,790 (284)

USING MORPHOLOGICAL DIFFERENTIAL ATTRIBUTE PROFILES FOR CHANGE CATEGORIZATION IN HIGH RESOLUTION SAR IMAGES [PDF]

open access: yesThe International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, 2013
Change detection in urban and suburban areas through remote sensing satellite imagery is an important topic. Furthermore, it is of special interest to derive information on the category of detected changes is of special interest. In Boldt et al. (2012),
M. Boldt   +4 more
doaj   +1 more source

Anonymous attribute-based designated verifier signature

open access: yesJournal of Ambient Intelligence and Humanized Computing, 2022
An Attribute-based signature (ABS), is a cryptographic scheme where someone can sign a message using any kind of predicates verified by the attributes he owns. For such scheme, it is expected to be impossible for users to collude to sign a message if none of them is originally able to sign the message on his own.
Blazy, Olivier   +3 more
openaire   +3 more sources

XML Security in Certificate Management - XML Certificator [PDF]

open access: yes, 2009
The trend of rapid growing use of XML format in data/document management system reveals that security measures should be urgently considered into next generation's data/document systems.
Cripps, Nathan, Lu, Joan
core   +1 more source

Verifiable Attribute-Based Keyword Search Over Encrypted Cloud Data Supporting Data Deduplication

open access: yesIEEE Access, 2020
Searchable encryption is a promising technique that allows cloud service provider return the interested files to the user, even if the shared files are encrypted.
Xueyan Liu   +4 more
doaj   +1 more source

The New Method of Sensor Data Privacy Protection for IoT

open access: yesShock and Vibration, 2021
This article introduces the new method of sensor data privacy protection method for IoT. Asymmetric encryption is used to verify the identity of the gateway by the sensor. The IoT gateway node verifies the integrity and source of the data, then creates a
Yue Wu, Liangtu Song, Lei Liu
doaj   +1 more source

DRAM Retention Behavior with Accelerated Aging in Commercial Chips

open access: yesApplied Sciences, 2022
The cells in dynamic random access memory (DRAM) degrade over time as a result of aging, leading to poor performance and potential security vulnerabilities.
Md Kawser Bepary   +2 more
doaj   +1 more source

A study on the traceable attribute-based signature scheme provided with anonymous credentials

open access: yesConnection Science
In order to provide the reliability of transmitted data in the era of big data, it is necessary to communicate by applying signature technology to data. There are various signature schemes, among which attribute-based signatures perform signatures based ...
Yong Woon Hwang   +3 more
doaj   +1 more source

I2PA : An Efficient ABC for IoT [PDF]

open access: yes, 2019
Internet of Things (IoT) is very attractive because of its promises. However, it brings many challenges, mainly issues about privacy preserving and lightweight cryptography.
Ciss, Abdoul Aziz   +2 more
core   +4 more sources

Zero Shot Recognition with Unreliable Attributes [PDF]

open access: yes, 2016
In principle, zero-shot learning makes it possible to train a recognition model simply by specifying the category's attributes. For example, with classifiers for generic attributes like \emph{striped} and \emph{four-legged}, one can construct a ...
Grauman, Kristen, Jayaraman, Dinesh
core  

Privacy-preserving attribute ticket scheme based on mobile terminal with smart card

open access: yesTongxin xuebao, 2022
To solve the problem that the existing electronic ticket systems are challenging to deploy in resource-constrained devices and cannot prevent the sharing of tickets among unauthorized devices, a privacy-preserving attribute ticket scheme based on mobile ...
Rui SHI   +5 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy