Sciweavers

335 search results - page 51 / 67
» Biometrics and Security
Sort
View
HICSS
2005
IEEE
223views Biometrics» more  HICSS 2005»
15 years 7 months ago
Intelligent Agent Supported Business Process Management
The complex business environment requires managing business processes with the ability to adapt to changes and to collaborate in activities. Conventional workflow approaches based...
Minhong Wang, Huaiqing Wang
110
Voted
EUROCRYPT
2005
Springer
15 years 7 months ago
Fuzzy Identity-Based Encryption
We introduce a new type of Identity-Based Encryption (IBE) scheme that we call Fuzzy Identity-Based Encryption. In Fuzzy IBE we view an identity as set of descriptive attributes. ...
Amit Sahai, Brent Waters
148
Voted
CCS
2006
ACM
15 years 5 months ago
Finding the original point set hidden among chaff
In biometric identification, a fingerprint is typically represented as a set of minutiae which are 2D points. A method [4] to protect the fingerprint template hides the minutiae b...
Ee-Chien Chang, Ren Shen, Francis Weijian Teo
HICSS
2009
IEEE
108views Biometrics» more  HICSS 2009»
15 years 8 months ago
Virtual Networks and Ethics: An Empirical Research in a Non-Governmental Organization
– This paper analyzes the opportunities offered by information and communication technologies (ICTs) and the related ethical issues they raise within the transparency practices of...
Antonino Vaccaro, Peter Madsen
HICSS
2009
IEEE
113views Biometrics» more  HICSS 2009»
15 years 8 months ago
Digital Forensics: Defining a Research Agenda
While many fields have well-defined research agendas, evolution of the field of digital forensics has been largely driven by practitioners in the field. As a result, the majority ...
Kara L. Nance, Brian Hay, Matt Bishop