Sciweavers

311 search results - page 36 / 63
» A Novel Privacy Enhancing Algorithm for Biometric System
Sort
View
DRMTICS
2005
Springer
15 years 7 months ago
A Vector Approach to Cryptography Implementation
The current deployment of Digital Right Management (DRM) schemes to distribute protected contents and rights is leading the way to massive use of sophisticated embedded cryptograph...
Jacques J. A. Fournier, Simon W. Moore
HICSS
2010
IEEE
237views Biometrics» more  HICSS 2010»
15 years 8 months ago
Data Aggregation and Analysis for Cancer Statistics - A Visual Analytics Approach
The disparity between data collected in rural and urban counties is often detrimental in the appropriate analysis of cancer care statistics. Low counts drastically affect the inci...
Ross Maciejewski, Travis Drake, Stephen Rudolph, A...
CCS
2010
ACM
15 years 1 months ago
Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
Cloud computing, as an emerging computing paradigm, enables users to remotely store their data into a cloud so as to enjoy scalable services on-demand. Especially for small and me...
Guojun Wang, Qin Liu, Jie Wu
ICIP
2006
IEEE
16 years 3 months ago
Resolution Improvement from Stereo Images with 3D Pose Differences
Resolution improvement from several images is typically restricted to simple planar rotations and translations. In this paper, a super-resolution algorithm that allows 3D ego-moti...
Siu-Hang Or, Ying Kin Yu, Kin-hong Wong, Michael M...
SICHERHEIT
2010
14 years 11 months ago
State Transfer for Hypervisor-Based Proactive Recovery of Heterogeneous Replicated Services
Intrusion-tolerant replication enables the construction of systems that tolerate a finite number of malicious faults. An arbitrary number of faults can be tolerated during system ...
Tobias Distler, Rüdiger Kapitza, Hans P. Reis...