Sciweavers

1398 search results - page 196 / 280
» Medical Database Security
Sort
View
88
Voted
DATESO
2010
150views Database» more  DATESO 2010»
14 years 10 months ago
Evolving Quasigroups by Genetic Algorithms
Abstract. Quasigroups are a well-known combinatorial design equivalent to more familiar Latin squares. Because all possible elements of a quasigroup occur with equal probability, i...
Václav Snásel, Jiri Dvorský, ...
133
Voted
ICB
2009
Springer
226views Biometrics» more  ICB 2009»
14 years 10 months ago
Fingerprint and On-Line Signature Verification Competitions at ICB 2009
This paper describes the objectives, the tasks proposed to the participants and the associated protocols in terms of database and assessment tools of two present competitions on fi...
Bernadette Dorizzi, Raffaele Cappelli, Matteo Ferr...
120
Voted
DBSEC
2011
233views Database» more  DBSEC 2011»
14 years 4 months ago
Multiparty Authorization Framework for Data Sharing in Online Social Networks
Online social networks (OSNs) have experienced tremendous growth in recent years and become a de facto portal for hundreds of millions of Internet users. These OSNs offer attractiv...
Hongxin Hu, Gail-Joon Ahn
EGOV
2011
Springer
14 years 12 days ago
Pseudonymization Service for X-Road eGovernment Data Exchange Layer
Abstract. Pseudonymization is sometimes used as a light-weight alternative to fully cryptographic solutions, when information from different data sources needs to be linked in a p...
Jan Willemson
124
Voted
EDBT
2012
ACM
262views Database» more  EDBT 2012»
13 years 3 months ago
The application of differential privacy to health data
Differential privacy has gained a lot of attention in recent years as a general model for the protection of personal information when used and disclosed for secondary purposes. It...
Fida Kamal Dankar, Khaled El Emam