Skip to main content

and
Your search also matched 14 preview-only Content is preview-only when you or your institution have not yet subscribed to it.

By making our abstracts and previews universally accessible we help you purchase only the content that is relevant to you.
results, e.g.

Two Adaptive Matching Learning Algorithms for Independent Component Analysis

Include preview-only content
  1. Chapter and Conference Paper

    An Anonymous Authentication Scheme for Identification Card

    This paper presents the concept of anonymous identification card, a technique enabling a card holder to demonstrates his/her authenticity without disclosing real identity. Anonymous identification card can be ...

    He Ge in Information and Communications Security (2006)

  2. Chapter and Conference Paper

    A Direct Anonymous Attestation Scheme for Embedded Devices

    Direct anonymous attestation (DAA) is an anonymous authentication scheme adopted by the Trusted Computing Group in its specifications for trusted computing platforms. This paper presents an efficient construct...

    He Ge, Stephen R. Tate in Public Key Cryptography – PKC 2007 (2007)

  3. Chapter and Conference Paper

    An Analysis for Anonymity and Unlinkability for a VoIP Conversation

    With the growth of its popularity, VoIP is increasingly popular nowadays. Similarly to other Internet applications, VoIP users may desire to be unlinkable with their participated VoIP session records for priva...

    Ge Zhang in Privacy and Identity Management for Life (2010)

  4. Chapter and Conference Paper

    Analyzing Key-Click Patterns of PIN Input for Recognizing VoIP Users

    Malicious intermediaries are able to detect the availability of VoIP conversation flows in a network and observe the IP addresses used by the conversation partners. However, it is insufficient to infer the cal...

    Ge Zhang in Future Challenges in Security and Privacy for Academia and Industry (2011)

  5. Chapter and Conference Paper

    Game Theoretic Approach for Cost-Benefit Analysis of Malware Proliferation Prevention

    Many existing research efforts in the field of malware proliferation aim at modelling and analysing its spread dynamics. Many malware dissemination models are based on the characteristics of biological disease...

    Theodoros Spyridopoulos, George Oikonomou in Security and Privacy Protection in Informa… (2013)

  6. Chapter and Conference Paper

    Small Tweaks Do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards

    Side-channel attacks are an increasingly important concern for the security of cryptographic embedded devices, such as the SIM cards used in mobile phones. Previous works have exhibited such attacks against im...

    Junrong Liu, Yu Yu, François-Xavier Standaert in Computer Security -- ESORICS 2015 (2015)

  7. Chapter and Conference Paper

    Fully Secure IBE with Tighter Reduction in Prime Order Bilinear Groups

    This paper present an identity-based encryption (IBE) scheme with full security in prime order bilinear groups by using dual pairing vector space. The security of our scheme is based upon decisional linear and...

    Jie Zhang, Aijun Ge, Siyu **ao, Chuangui Ma in Information and Communications Security (2016)