Sciweavers

2386 search results - page 213 / 478
» Database Security 2000
Sort
View
NDSS
1998
IEEE
15 years 3 months ago
The Secure Remote Password Protocol
This paper presents a new password authentication and key-exchange protocol suitable for authenticating users and exchanging keys over an untrusted network. The new protocol resis...
Thomas D. Wu
IVIC
2009
Springer
15 years 5 months ago
Secure Minutiae-Based Fingerprint Templates Using Random Triangle Hashing
Abstract. Due to privacy concern on the widespread use of biometric authentication systems, biometric template protection has gained great attention in the biometric research recen...
Zhe Jin, Andrew Beng Jin Teoh, Thian Song Ong, Con...
USS
2010
14 years 8 months ago
Securing Script-Based Extensibility in Web Browsers
Web browsers are increasingly designed to be extensible to keep up with the Web's rapid pace of change. This extensibility is typically implemented using script-based extensi...
Vladan Djeric, Ashvin Goel
77
Voted
CODES
2000
IEEE
15 years 3 months ago
Linking codesign and reuse in embedded systems design
This paper presents a complete codesign environment for embedded systems which combines automatic partitioning with reuse from a module database. Special emphasis has been put on ...
Matthias Meerwein, C. Baumgartner, W. Glauert
DEXA
2000
Springer
104views Database» more  DEXA 2000»
15 years 2 months ago
Extending RDBMS for Allowing Fuzzy Quantified Queries
This paper is mainly concerned with the extension of database management systems querying capabilities, so that users may address queries involving preferences and get discriminate...
Leonid José Tineo Rodríguez