Sciweavers

3349 search results - page 184 / 670
» Data Security
Sort
View
TES
2001
Springer
15 years 8 months ago
Security for Distributed E-Service Composition
Current developments show that tomorrow’s information systems and applications will no longer be based on monolithic architectures that encompass all the functionality. Rather, t...
Stefan Seltzsam, Stephan Börzsönyi, Alfo...
ICASSP
2009
IEEE
15 years 10 months ago
Secure image retrieval through feature protection
This paper addresses the problem of image retrieval from an encrypted database, where data confidentiality is preserved both in the storage and retrieval process. The paper focus...
Wenjun Lu, Avinash L. Varna, Ashwin Swaminathan, M...
IEEEIAS
2009
IEEE
15 years 10 months ago
Secure Access Control Scheme of RFID System Application
-- Radio Frequency Identification (RFID) is a contactless technology, it is considered the way to replace the barcode, since the barcode data is read with line of sight and limits ...
Yu-Chih Huang
CCS
2000
ACM
15 years 8 months ago
XML document security based on provisional authorization
The extensible markup language (XML) is a promising standard for describing semi-structured information and contents on the Internet. When XML comes to be a widespread data encodi...
Michiharu Kudo, Satoshi Hada
FPL
2006
Springer
147views Hardware» more  FPL 2006»
15 years 7 months ago
Secure Content Distribution System Based on Run-Time Partial Hardware Reconfiguration
A secure content distribution system is prototyped based on run-time partial reconfigurability of an FPGA. The system provides a robust content protection scheme for online conten...
Yohei Hori, Hiroyuki Yokoyama, Kenji Toda