Sciweavers

3349 search results - page 143 / 670
» Data Security
Sort
View
ICC
2007
IEEE
157views Communications» more  ICC 2007»
15 years 10 months ago
Secure Aggregation in Sensor Networks Using Neighborhood Watch
Abstract— Many sensor networks (SN) use in-network aggregation to minimize the amount of data transmitted by sensors. Unfortunately, aggregation makes the network more vulnerable...
Paul Rabinovich, Robert Simon
126
Voted
ACNS
2003
Springer
123views Cryptology» more  ACNS 2003»
15 years 8 months ago
Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards
Abstract. The use of biometrics, and fingerprint recognition in particular, for cardholder authentication in smartcard systems is growing in popularity, and such systems are the f...
Luciano Rila, Chris J. Mitchell
HICSS
2010
IEEE
152views Biometrics» more  HICSS 2010»
15 years 8 months ago
Increasing Software Security through Open Source or Closed Source Development? Empirics Suggest that We have Asked the Wrong Que
While many theoretical arguments against or in favor of open source and closed source software development have been presented, the empirical basis for the assessment of arguments...
Guido Schryen, Eliot Rich
150
Voted
ICPR
2010
IEEE
15 years 1 months ago
Lossless ROI Medical Image Watermarking Technique with Enhanced Security and High Payload Embedding
In this article, a new fragile, blind, high payload capacity, ROI (Region of Interest) preserving Medical image watermarking (MIW) technique in the spatial domain for grayscale med...
Malay Kumar Kundu, Sudeb Das
140
Voted
XMLSEC
2003
ACM
15 years 8 months ago
A bitmap-based access control for restricted views of XML documents
The information on the web is growing at a very fast pace. In this ever-accumulating data, the volume of information represented in XML format is on the rise in recent times. An o...
Abhilash Gummadi, Jong P. Yoon, Biren Shah, Vijay ...