Sciweavers

1398 search results - page 196 / 280
» Medical Database Security
Sort
View
DATESO
2010
150views Database» more  DATESO 2010»
15 years 1 months ago
Evolving Quasigroups by Genetic Algorithms
Abstract. Quasigroups are a well-known combinatorial design equivalent to more familiar Latin squares. Because all possible elements of a quasigroup occur with equal probability, i...
Václav Snásel, Jiri Dvorský, ...
160
Voted
ICB
2009
Springer
226views Biometrics» more  ICB 2009»
15 years 1 months ago
Fingerprint and On-Line Signature Verification Competitions at ICB 2009
This paper describes the objectives, the tasks proposed to the participants and the associated protocols in terms of database and assessment tools of two present competitions on fi...
Bernadette Dorizzi, Raffaele Cappelli, Matteo Ferr...
DBSEC
2011
233views Database» more  DBSEC 2011»
14 years 7 months ago
Multiparty Authorization Framework for Data Sharing in Online Social Networks
Online social networks (OSNs) have experienced tremendous growth in recent years and become a de facto portal for hundreds of millions of Internet users. These OSNs offer attractiv...
Hongxin Hu, Gail-Joon Ahn
189
Voted
EGOV
2011
Springer
14 years 3 months ago
Pseudonymization Service for X-Road eGovernment Data Exchange Layer
Abstract. Pseudonymization is sometimes used as a light-weight alternative to fully cryptographic solutions, when information from different data sources needs to be linked in a p...
Jan Willemson
EDBT
2012
ACM
262views Database» more  EDBT 2012»
13 years 6 months ago
The application of differential privacy to health data
Differential privacy has gained a lot of attention in recent years as a general model for the protection of personal information when used and disclosed for secondary purposes. It...
Fida Kamal Dankar, Khaled El Emam