Proceedings of the 3rd International Conference on Cryptography, Security and Privacy最新文献

筛选
英文 中文
Multiway analysis for face recognition 人脸识别的多向分析
Suriani Ab Rahman, Marcella Peter, Jacey-Lynn Minoi, Hamimah Ujir
{"title":"Multiway analysis for face recognition","authors":"Suriani Ab Rahman, Marcella Peter, Jacey-Lynn Minoi, Hamimah Ujir","doi":"10.1145/3309074.3309111","DOIUrl":"https://doi.org/10.1145/3309074.3309111","url":null,"abstract":"The benefit of multiway analysis is it can extract underlying structures, as well as, establishing unknown relationship among the components (modes) of multidimensional data. This can be achieved using tensor decomposition approach. The aim of this paper is to emphasize on the advantage of this approach in face applications. As face researches have demonstrated that human faces are represented in high dimensional space with static and dynamic facial attributes, a good interpretation of a model can thus reveal an explicit relationship between the model and the factors. Motivated by this, we study the effect of two facial attributes, expression and intensity towards recognition performance. At the same time, we compare the recognition rates of tensor model with Principal Component Analysis (PCA) technique. The results showed that tensor model gives a higher recognition rate compared to PCA and there is an interaction effect between expression and intensity factors that affect the recognition performance.","PeriodicalId":430283,"journal":{"name":"Proceedings of the 3rd International Conference on Cryptography, Security and Privacy","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128620361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trust-based identity sharing for token grants 用于令牌授予的基于信任的身份共享
Kavindu Dodanduwa, I. Kaluthanthri
{"title":"Trust-based identity sharing for token grants","authors":"Kavindu Dodanduwa, I. Kaluthanthri","doi":"10.1145/3309074.3309078","DOIUrl":"https://doi.org/10.1145/3309074.3309078","url":null,"abstract":"Authentication and authorization are two key elements of a software application. In modern day, OAuth 2.0 framework and OpenID Connect protocol are widely adopted standards fulfilling these requirements. These protocols are implemented into authorization servers. It is common to call these authorization servers as identity servers or identity providers since they hold user identity information. Applications registered to an identity provider can use OpenID Connect to retrieve ID token for authentication. Access token obtained along with ID token allows the application to consume OAuth 2.0 protected resources. In this approach, the client application is bound to a single identity provider. If the client needs to consume a protected resource from a different domain, which only accepts tokens of a defined identity provider, then the client must again follow OpenID Connect protocol to obtain new tokens. This requires user identity details to be stored in the second identity provider as well. This paper proposes an extension to OpenID Connect protocol to overcome this issue. It proposes a client-centric mechanism to exchange identity information as token grants against a trusted identity provider. Once a grant is accepted, resulting token response contains an access token, which is good enough to access protected resources from token issuing identity provider's domain.","PeriodicalId":430283,"journal":{"name":"Proceedings of the 3rd International Conference on Cryptography, Security and Privacy","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114726447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Proceedings of the 3rd International Conference on Cryptography, Security and Privacy 第三届密码学、安全与隐私国际会议论文集
{"title":"Proceedings of the 3rd International Conference on Cryptography, Security and Privacy","authors":"","doi":"10.1145/3309074","DOIUrl":"https://doi.org/10.1145/3309074","url":null,"abstract":"","PeriodicalId":430283,"journal":{"name":"Proceedings of the 3rd International Conference on Cryptography, Security and Privacy","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122176638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信