Sciweavers

2386 search results - page 284 / 478
» Database Security 2000
Sort
View
ADBIS
2009
Springer
144views Database» more  ADBIS 2009»
15 years 10 months ago
Learning Support and Legally Ruled Collaboration in the VirtualLife Virtual World Platform
The paper addresses the purposes and design decisions produced while developing a peer-to-peer virtual world platform. The work is being done within the FP7 VirtualLife project. Th...
Vytautas Cyras, Kristina Lapin
ICDE
2007
IEEE
123views Database» more  ICDE 2007»
15 years 9 months ago
Privacy Preserving Pattern Discovery in Distributed Time Series
The search for unknown frequent pattern is one of the core activities in many time series data mining processes. In this paper we present an extension of the pattern discovery pro...
Josenildo Costa da Silva, Matthias Klusch
IEEEIAS
2007
IEEE
15 years 9 months ago
Protection of Mammograms Using Blind Steganography and Watermarking
As medical image databases are connected together through PACS, those medical images may suffer from security breaches if not protected. If a medical image is illegally obtained o...
Yue Li, Chang-Tsun Li, Chia-Hung Wei
DEXA
2007
Springer
96views Database» more  DEXA 2007»
15 years 9 months ago
Data Management in RFID Applications
Nowadays, RFID applications have attracted a great deal of interest due to their increasing adoptions in supply chain management, logistics and security. They have posed many new c...
Dan Lin, Hicham G. Elmongui, Elisa Bertino, Beng C...
ICB
2007
Springer
427views Biometrics» more  ICB 2007»
15 years 9 months ago
"3D Face": Biometric Template Protection for 3D Face Recognition
Abstract. In this paper we apply template protection to an authentication system based on 3D face data in order to protect the privacy of its users. We use the template protection ...
Emile J. C. Kelkboom, Berk Gökberk, Tom A. M....