Sciweavers

2386 search results - page 178 / 478
» Database Security 2000
Sort
View
ICDE
2007
IEEE
124views Database» more  ICDE 2007»
15 years 4 months ago
Secure Content Validation
Information dissemination in electronic form has improved drastically over the past few years. New technologies in web feeds allow the uses to get notified automatically when new...
Mummoorthy Murugesan, Wei Jiang
DASFAA
2010
IEEE
148views Database» more  DASFAA 2010»
15 years 2 months ago
Competitive Privacy: Secure Analysis on Integrated Sequence Data
Sequence data analysis has been extensively studied in the literature. However, most previous work focuses on analyzing sequence data from a single source or party. In many applica...
Raymond Chi-Wing Wong, Eric Lo
SDMW
2005
Springer
15 years 3 months ago
Experiments with Queries over Encrypted Data Using Secret Sharing
To avoid insider attacks one cannot rely on access control to protect a database scheme. Encrypting the database is a better option. This paper describes a working prototype of an ...
Richard Brinkman, Berry Schoenmakers, Jeroen Doume...
TIFS
2010
173views more  TIFS 2010»
14 years 8 months ago
A hybrid approach for generating secure and discriminating face template
Abstract—Biometric template protection is one of the most important issues in deploying a practical biometric system. To tackle this problem, many algorithms, that do not store t...
Yi C. Feng, Pong C. Yuen, Anil K. Jain
ECCV
2000
Springer
16 years 6 days ago
Learning Over Multiple Temporal Scales in Image Databases
Abstract. The ability to learn from user interaction is an important asset for content-based image retrieval (CBIR) systems. Over short times scales, it enables the integration of ...
Nuno Vasconcelos, Andrew Lippman