Sciweavers

3299 search results - page 536 / 660
» Privacy and Trusted Computing
Sort
View
170
Voted
ACMDIS
2010
ACM
15 years 4 months ago
On the design of a "moody" keyboard
To counter the increasing number of online threats for users' privacy and security, this paper explores the design of an ambient security indicator, in form of a standard key...
Alexander De Luca, Bernhard Frauendienst, Max-Eman...
118
Voted
PVLDB
2010
104views more  PVLDB 2010»
15 years 2 months ago
Boosting the Accuracy of Differentially Private Histograms Through Consistency
We show that it is possible to significantly improve the accuracy of a general class of histogram queries while satisfying differential privacy. Our approach carefully chooses a...
Michael Hay, Vibhor Rastogi, Gerome Miklau, Dan Su...
ICPR
2010
IEEE
15 years 2 months ago
Discriminating Intended Human Objects in Consumer Videos
In a consumer video, there are not only intended objects, which are intentionally captured by the camcorder user, but also unintended objects, which are accidentally framed-in. Sin...
Hiroshi Uegaki, Yuta Nakashima, Noboru Babaguchi
159
Voted
ICPR
2010
IEEE
15 years 2 months ago
Lossless ROI Medical Image Watermarking Technique with Enhanced Security and High Payload Embedding
In this article, a new fragile, blind, high payload capacity, ROI (Region of Interest) preserving Medical image watermarking (MIW) technique in the spatial domain for grayscale med...
Malay Kumar Kundu, Sudeb Das
ACSAC
2009
IEEE
15 years 8 months ago
Justifying Integrity Using a Virtual Machine Verifier
Emerging distributed computing architectures, such as grid and cloud computing, depend on the high integrity execution of each system in the computation. While integrity measuremen...
Joshua Schiffman, Thomas Moyer, Christopher Shal, ...