A biometric template protection system for dynamic signature veri cation is presented. The approach uses auxiliary (helper) data that allows the matching with secure templates but...
Some promising recent schemes for XML access control employ encryption for implementing security policies on published data, avoiding data duplication. In this paper we study one ...
Abstract. Intrusion detection systems gather large quantities of host and network information in an attempt to detect and respond to attacks against an organization. The widely var...
Recently, privacy issues have become important in clustering analysis, especially when data is horizontally partitioned over several parties. Associative queries are the core retr...
Previous work has shown that principal component analysis (PCA) of three-dimensional face models can be used to perform recognition to a high degree of accuracy. However, experimen...