Sciweavers

881 search results - page 60 / 177
» Secure Personal Data Servers: a Vision Paper
Sort
View
CCS
2003
ACM
15 years 7 months ago
Anomaly detection of web-based attacks
Web-based vulnerabilities represent a substantial portion of the security exposures of computer networks. In order to detect known web-based attacks, misuse detection systems are ...
Christopher Krügel, Giovanni Vigna
71
Voted
ICPR
2008
IEEE
15 years 8 months ago
A cryptosystem based on palmprint feature
Biometric cryptography is a technique using biometric features to encrypt data, which can improve the security of the encrypted data and overcome the shortcomings of the tradition...
Xiangqian Wu, Kuanquan Wang, David Zhang
DOLAP
2004
ACM
15 years 7 months ago
Physical modeling of data warehouses using UML
During the few last years, several approaches have been proposed to model different aspects of a Data Warehouse (DW), such as the conceptual model of the DW, the design of the ET...
Sergio Luján-Mora, Juan Trujillo
160
Voted
WOA
2010
14 years 11 months ago
Using Mobile Agents for Secure Biometric Authentication
This paper deals with the definition of a strong authentication model, coupling usual password/PIN based methods with a biometric matching, over a Multi Agent distributed infrastru...
Marco Tranquillin, Carlo Ferrari, Michele Moro
ICIP
2007
IEEE
16 years 3 months ago
Isomap Tracking with Particle Filtering
The problem of tracking involves challenges like in-plane and out-of-plane rotations, scaling, variations in ambient light and occlusions. In this paper we look at the problem of ...
Nikhil Rane, Stanley T. Birchfield