Sciweavers

2386 search results - page 143 / 478
» Database Security 2000
Sort
View
IJBRA
2008
116views more  IJBRA 2008»
14 years 10 months ago
High performance bio-image database retrieval using MPI
: Fast and accurate 3D object reconstruction and partial 3D component retrieval from 2D image slices represent a difficult and challenging problem. To group related objects on diff...
Yong Li, Xiujuan Chen, Saeid Belkasim, Yi Pan
EDBT
2012
ACM
262views Database» more  EDBT 2012»
13 years 14 days ago
The application of differential privacy to health data
Differential privacy has gained a lot of attention in recent years as a general model for the protection of personal information when used and disclosed for secondary purposes. It...
Fida Kamal Dankar, Khaled El Emam
INFOCOM
2008
IEEE
15 years 4 months ago
A Novel Quantitative Approach For Measuring Network Security
—Evaluation of network security is an essential step in securing any network. This evaluation can help security professionals in making optimal decisions about how to design secu...
Mohammad Salim Ahmed, Ehab Al-Shaer, Latifur Khan
CRYPTO
2000
Springer
139views Cryptology» more  CRYPTO 2000»
15 years 2 months ago
On the Exact Security of Full Domain Hash
Abstract. The Full Domain Hash (FDH) scheme is a RSA-based signature scheme in which the message is hashed onto the full domain of the RSA function. The FDH scheme is provably secu...
Jean-Sébastien Coron
ASIACRYPT
2000
Springer
15 years 1 months ago
The Security of Chaffing and Winnowing
This paper takes a closer look at Rivest's chaffing-and-winnowing paradigm for data privacy. We begin with a definition which enables one to clearly determine whether a given ...
Mihir Bellare, Alexandra Boldyreva