Sciweavers

149 search results - page 16 / 30
» Coding Solutions for the Secure Biometric Storage Problem
Sort
View
94
Voted
ISCAS
2007
IEEE
99views Hardware» more  ISCAS 2007»
15 years 3 months ago
A Parallel Architecture for Hermitian Decoders: Satisfying Resource and Throughput Constraints
— Hermitian Codes offer desirable properties such as large code lengths, good error-correction at high code rates, etc. The main problem in making Hermitian codes practical is to...
Rachit Agarwal, Emanuel M. Popovici, Brendan O'Fly...
CCS
2011
ACM
13 years 9 months ago
How to tell if your cloud files are vulnerable to drive crashes
This paper presents a new challenge—verifying that a remote server is storing a file in a fault-tolerant manner, i.e., such that it can survive hard-drive failures. We describe...
Kevin D. Bowers, Marten van Dijk, Ari Juels, Alina...
CCS
2006
ACM
15 years 1 months ago
Lightweight, pollution-attack resistant multicast authentication scheme
Authentication is an important security measure for multicast applications, providing receivers with confidence that the packets they receive are valid. Simply signing every multi...
Ya-Jeng Lin, Shiuhpyng Shieh, Warren W. Lin
93
Voted
USM
2000
15 years 1 months ago
Trade-offs in a Secure Jini Service Architecture
Jini is an infrastructure built on top of the mobile code facilities of the Java programming language enabling clients and services to spontaneously engage in arbitrary usage scena...
Peer Hasselmeyer, Roger Kehr, Marco Voß
CIKM
2005
Springer
15 years 3 months ago
A function-based access control model for XML databases
XML documents are frequently used in applications such as business transactions and medical records involving sensitive information. Typically, parts of documents should be visibl...
Naizhen Qi, Michiharu Kudo, Jussi Myllymaki, Hamid...