Sciweavers

3210 search results - page 1 / 642
» Secure Similarity Search
Sort
View
GRC
2007
IEEE
13 years 10 months ago
Secure Similarity Search
— One of the most substantial ways to protect users’ sensitive information is encryption. This paper is about the keyword index search system on encrypted documents. It has bee...
Hyun-A Park, Bum Han Kim, Dong Hoon Lee, Yon Dohn ...
ISAAC
2010
Springer
276views Algorithms» more  ISAAC 2010»
13 years 2 months ago
Anonymous Fuzzy Identity-Based Encryption for Similarity Search
Abstract. In this paper, we consider the problem of predicate encryption and focus on the predicate for testing whether the hamming distance between the attribute X of a data item ...
David W. Cheung, Nikos Mamoulis, W. K. Wong, Siu-M...
JCP
2006
232views more  JCP 2006»
13 years 4 months ago
Indexing of Motion Capture Data for Efficient and Fast Similarity Search
As motion capture systems are increasingly used for motion tracking and capture, and more and more surveillance cameras are installed for security protection, more and more motion ...
Chuanjun Li, B. Prabhakaran
WWW
2005
ACM
14 years 4 months ago
Detection of phishing webpages based on visual similarity
An approach to detection of phishing webpages based on visual similarity is proposed, which can be utilized as a part of an enterprise solution for anti-phishing. A legitimate web...
Liu Wenyin, Guanglin Huang, Liu Xiaoyue, Zhang Min...