Sciweavers

632 search results - page 127 / 127
» Using Biologically Inspired Features for Face Processing
Sort
View
VLDB
2007
ACM
155views Database» more  VLDB 2007»
14 years 5 months ago
Answering Aggregation Queries in a Secure System Model
As more sensitive data is captured in electronic form, security becomes more and more important. Data encryption is the main technique for achieving security. While in the past en...
Tingjian Ge, Stanley B. Zdonik
DAC
2005
ACM
14 years 6 months ago
Efficient fingerprint-based user authentication for embedded systems
User authentication, which refers to the process of verifying the identity of a user, is becoming an important security requirement in various embedded systems. While conventional...
Pallav Gupta, Srivaths Ravi, Anand Raghunathan, Ni...