Sciweavers

58 search results - page 5 / 12
» Efficient Robust Storage Using Secret Tokens
Sort
View
EDBT
2009
ACM
134views Database» more  EDBT 2009»
15 years 3 months ago
Caching content-based queries for robust and efficient image retrieval
In order to become an effective complement to traditional Web-scale text-based image retrieval solutions, content-based image retrieval must address scalability and efficiency iss...
Fabrizio Falchi, Claudio Lucchese, Salvatore Orlan...
ICISC
2008
89views Cryptology» more  ICISC 2008»
15 years 1 months ago
Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks
Group key agreement (GKA) allows a set of players to establish a shared secret and thus bootstrap secure group communication. GKA is very useful in many types of peer group scenar...
Jihye Kim, Gene Tsudik
ICCV
2009
IEEE
16 years 4 months ago
Efficient Privacy Preserving Video Surveillance
Widespread use of surveillance cameras in offices and other business establishments, pose a significant threat to the privacy of the employees and visitors. The challenge of int...
Maneesh Upmanyu, Anoop M. Namboodiri, Kannan Srina...
IJCNN
2000
IEEE
15 years 4 months ago
Storage and Recall of Complex Temporal Sequences through a Contextually Guided Self-Organizing Neural Network
A self-organizing neural network for learning and recall of complex temporal sequences is proposed. we consider a single sequence with repeated items, or several sequences with a c...
Guilherme De A. Barreto, Aluizio F. R. Araú...
120
Voted
USS
2010
14 years 9 months ago
P4P: Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users
In this paper we introduce a framework for privacypreserving distributed computation that is practical for many real-world applications. The framework is called Peers for Privacy ...
Yitao Duan, NetEase Youdao, John Canny, Justin Z. ...