2009 International Conference on Electrical, Communications, and Computers, 2009
Wireless Sensor Networks are a rapid grown technology trying to adopt several new applications. S... more Wireless Sensor Networks are a rapid grown technology trying to adopt several new applications. Such applications have brought new challenges to the table and in consequence there are services that became to be critical factors, just like authenticity in WSN. Node authenticity in WSN is a commodity service that allows verifying that the message source is a node belonging to
2009 International Conference on Electrical, Communications, and Computers, 2009
Electronic voting processes are facing an evolution due to its requirements, especially the ones ... more Electronic voting processes are facing an evolution due to its requirements, especially the ones needed to provide full security. In addition it should reduce costs and increase processing speed. Considering the aforementioned, an electronic voting protocol based on bilinear pairings is presented, which uses the message authentication codes (MAC), the blind signature scheme and a scheme of threshold identity based
Second International Conference on Internet Monitoring and Protection (ICIMP 2007), 2007
Fingerprint recognition is one of the most popular and successful methods used for person identif... more Fingerprint recognition is one of the most popular and successful methods used for person identification, which takes advantage of the fact that the fingerprint has some unique characteristics called minutiae; which are points where a curve track finishes, intersect with other track or branches off. Biometric identification systems using fingerprints patterns are called AFIS (Automatic Fingerprint Identification System). In this
... Este modelado dinámico de los costos del protocolo durante la vida de una WSN es otro trabajo... more ... Este modelado dinámico de los costos del protocolo durante la vida de una WSN es otro trabajo a futuro que ayudará a establecer con mayor precisión la viabilidad del protocolo propuesto. ... 2007. pp. 57-72. [ Links ]. 7. W. Du, J. Deng, YS Han, PK Varshney, J. Katz, A. Khalili. ...
2009 International Conference on Electrical, Communications, and Computers, 2009
Wireless Sensor Networks are a rapid grown technology trying to adopt several new applications. S... more Wireless Sensor Networks are a rapid grown technology trying to adopt several new applications. Such applications have brought new challenges to the table and in consequence there are services that became to be critical factors, just like authenticity in WSN. Node authenticity in WSN is a commodity service that allows verifying that the message source is a node belonging to
2009 International Conference on Electrical, Communications, and Computers, 2009
Electronic voting processes are facing an evolution due to its requirements, especially the ones ... more Electronic voting processes are facing an evolution due to its requirements, especially the ones needed to provide full security. In addition it should reduce costs and increase processing speed. Considering the aforementioned, an electronic voting protocol based on bilinear pairings is presented, which uses the message authentication codes (MAC), the blind signature scheme and a scheme of threshold identity based
Second International Conference on Internet Monitoring and Protection (ICIMP 2007), 2007
Fingerprint recognition is one of the most popular and successful methods used for person identif... more Fingerprint recognition is one of the most popular and successful methods used for person identification, which takes advantage of the fact that the fingerprint has some unique characteristics called minutiae; which are points where a curve track finishes, intersect with other track or branches off. Biometric identification systems using fingerprints patterns are called AFIS (Automatic Fingerprint Identification System). In this
... Este modelado dinámico de los costos del protocolo durante la vida de una WSN es otro trabajo... more ... Este modelado dinámico de los costos del protocolo durante la vida de una WSN es otro trabajo a futuro que ayudará a establecer con mayor precisión la viabilidad del protocolo propuesto. ... 2007. pp. 57-72. [ Links ]. 7. W. Du, J. Deng, YS Han, PK Varshney, J. Katz, A. Khalili. ...
Uploads
Papers by Moisés Salinas R