Skip to main content

Dartmouth Digital Library Collections

You've searched:

All Collections
  • All fields: authenticating
(13 results)



Display: 50

    • Market-based control of mobile-agent systems.

    • Market-based control of mobile-agent systems.
    • Mobile agents (Computer software). ; Resource allocation -- Mathematical models. ; Computer networks -- Economic aspects.
    • Modern distributed systems scatter sensors, storage, and computation throughout the environment. Ideally these devices communicate and share resources, but there is seldom motivation for a device''s owner to yield control to another user. We...
    • Naming and sharing resources across administrative boundaries.

    • Naming and sharing resources across administrative boundaries.
    • Electronic data processing -- Distributed processing. ; Computer network architectures. ; Programming languages (Electronic computers) -- Semantics. ; Database management.
    • I tackle the problem of naming and sharing resources across administrative boundaries. Conventional systems manifest the hierarchy of typical administrative structure in the structure of their own mechanism. While natural for communication that...
    • Patient classification from fMRI brain activation patterns.

    • Patient classification from fMRI brain activation patterns.
    • Brain -- Magnetic resonance imaging. ; Brain mapping. Brain -- Localization of functions. ; Diagnostic imaging. ; Pattern perception. ; Patients -- Classification. ; Alzheimer's disease -- Diagnosis. ; Schizophrenia -- Diagnosis. ; Brain damage --...
    • Earlier work has suggested that various neurological or neuropsychiatric disorders may result in characteristic spatial patterns in brain activation, potentially allowing their detection from maps of brain activity under different conditions....
    • SHEMP: secure hardware enhanced MyProxy.

    • SHEMP: secure hardware enhanced MyProxy.
    • Public key infrastructure (Computer security). ; Computer networks -- Security measures. ; Operating systems (Computers). ; Microcomputers.
    • In 1976, Whitfield Diffie and Martin Hellman demonstrated how public key cryptography could enable secure information exchange between parties that do not share secrets. In order for public key cryptography to work in modern distributed...
    • Natural image statistics for digital image forensics.

    • Natural image statistics for digital image forensics.
    • Image processing -- Statistical methods. Image processing -- Digital techniques. Images
    • We describe a set of natural image statistics that are built upon two multi-scale image decompositions, the quadrature mirror filter pyramid decomposition and the local angular harmonic decomposition. These image statistics consist of first- and...
    • Agent Tcl: a flexible and secure mobile-agent system.

    • Agent Tcl: a flexible and secure mobile-agent system.
    • Intelligent agents (Computer software). ; Electronic data processing -- Distributed processing. ; Tcl (Computer program language). ; Computer networks -- Security measures.
    • A mobile agent is an autonomous program that can migrate under its own control from machine to machine in a heterogeneous network. In other words, the program can suspend its execution at an arbitrary point, transport itself to another machine, and...
    • Attribute-based, usefully secure email.

    • Attribute-based, usefully secure email.
    • Electronic mail systems -- Security measures. Electronic mail systems -- Social aspects. Trust.
    • A secure system that cannot be used by real users to secure real-world processes is not really secure at all. While many believe that usability and security are diametrically opposed, a growing body of research from the field of Human-Computer...
    • Digital video forensics.

    • Digital video forensics.
    • Digital video -- Analysis. Forensic sciences. Image processing -- Digital techniques.
    • We present new forensic tools that are capable of detecting traces of tampering in digital video without the use of watermarks or specialized hardware. These tools operate under the assumption that video contain naturally occurring properties which...
    • Hardware-Assisted Secure Computation.

    • Hardware-Assisted Secure Computation.
    • Computer networks -- Security measures. Computer networks -- Access control. Computer network protocols.
    • The theory community has worked on Secure Multiparty Computation (SMC) for more than two decades, and has produced many protocols for many settings. One common thread in these works is that the protocols cannot use a Trusted Third Party (TTP), even...

QuickView

Display a larger image and more item information when the pointer pauses over a thumbnail
on off
 

Layout options:

Thumbnail with title
Grid with smaller thumbnails and more detail
Select the collections to add or remove from your search
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
 
OK