: In this paper we propose two generic mechanisms implemented in a cadastre internet information system. The first one is the list of last queries submitted by a given user and the...
— Juels et. al proposed a fuzzy vault scheme that extracts secret from inexact biometric information. However, typical feature extracted from fingerprint, called minutiae, is as...
Covert channel attacks utilize shared resources to indirectly transmit sensitive information to unauthorized parties. Current security mechanisms such as SELinux rely on tagging th...
Yung-Chuan Lee, Stephen Bishop, Hamed Okhravi, Sha...
All the specialists have agreed that the possibility of adding to multimedia WWW objects some sort of `conceptual' annotations describing their information content would grea...
This paper uses results from research in Clinical Information Systems (CIS) design, the psychology of clinical reasoning, and Ecological Interface Design (EID) to motivate general ...