Sciweavers

169 search results - page 29 / 34
» A Revocation Scheme Preserving Privacy
Sort
View
107
Voted
ICDE
2006
IEEE
149views Database» more  ICDE 2006»
15 years 5 months ago
An Encrypted, Content Searchable Scalable Distributed Data Structure
Scalable Distributed Data Structures (SDDS) store data in a file of key-based records distributed over many storage sites. The number of storage sites utilized grows and shrinks w...
Thomas J. E. Schwarz, Peter Tsui, Witold Litwin
105
Voted
PAMI
2007
133views more  PAMI 2007»
14 years 11 months ago
Generating Cancelable Fingerprint Templates
—Biometrics-based authentication systems offer obvious usability advantages over traditional password and token-based authentication schemes. However, biometrics raises several p...
Nalini K. Ratha, Sharat Chikkerur, Jonathan H. Con...
CASCON
2004
129views Education» more  CASCON 2004»
15 years 1 months ago
Building predictors from vertically distributed data
Due in part to the large volume of data available today, but more importantly to privacy concerns, data are often distributed across institutional, geographical and organizational...
Sabine M. McConnell, David B. Skillicorn
ESORICS
2009
Springer
15 years 2 months ago
Medical Image Integrity Control Combining Digital Signature and Lossless Watermarking
Enforcing protection of medical content becomes a major issue of computer security. Since medical contents are more and more widely distributed, it is necessary to develop security...
Wei Pan, Gouenou Coatrieux, Nora Cuppens-Boulahia,...
ET
2010
89views more  ET 2010»
14 years 10 months ago
On the Duality of Probing and Fault Attacks
In this work we investigate the problem of simultaneous privacy and integrity protection in cryptographic circuits. We consider a white-box scenario with a powerful, yet limited at...
Berndt M. Gammel, Stefan Mangard