Sciweavers

311 search results - page 26 / 63
» A Novel Privacy Enhancing Algorithm for Biometric System
Sort
View
ICMI
2005
Springer
143views Biometrics» more  ICMI 2005»
15 years 7 months ago
A look under the hood: design and development of the first SmartWeb system demonstrator
Experience shows that decisions in the early phases of the development of a multimodal system prevail throughout the life-cycle of a project. The distributed architecture and the ...
Norbert Reithinger, Simon Bergweiler, Ralf Engel, ...
KES
2005
Springer
15 years 7 months ago
Watermarking Protocol Compatible with Secret Algorithms for Resisting Invertibility Attack
Abstract. Invertibility attack is a hostile measure to breach watermarking systems. In this paper, a novel watermarking protocol using a one-way hash function and a check of random...
Xinpeng Zhang, Shuozhong Wang
HICSS
2006
IEEE
123views Biometrics» more  HICSS 2006»
15 years 7 months ago
An Economic Model for Comparing Search Services
Search services are now ubiquitously employed in searching for documents on the Internet and on enterprise intranets. This research develops an economic model for comparing search...
Stephen K. Kwan, Shailaja Venkatsubramanyan
CSFW
2008
IEEE
15 years 8 months ago
DKAL: Distributed-Knowledge Authorization Language
DKAL is a new declarative authorization language for distributed systems. It is based on existential fixed-point logic and is considerably more expressive than existing authoriza...
Yuri Gurevich, Itay Neeman
HICSS
2003
IEEE
186views Biometrics» more  HICSS 2003»
15 years 6 months ago
Personalization through Mask Marketing
Customized marketing, so called 1-to-1 marketing, is often viewed as the panacea of e-commerce. User profiles, such as click streams logging every site the user accesses, are expl...
Moritz Strasser, Alf Zugenmaier