Sciweavers

6555 search results - page 1098 / 1311
» Secure attribute-based systems
Sort
View
106
Voted
VLDB
2004
ACM
105views Database» more  VLDB 2004»
15 years 9 months ago
Tamper Detection in Audit Logs
Audit logs are considered good practice for business systems, and are required by federal regulations for secure systems, drug approval data, medical information disclosure, fina...
Richard T. Snodgrass, Shilong (Stanley) Yao, Chris...
136
Voted
IUI
2010
ACM
15 years 9 months ago
Towards a reputation-based model of social web search
While web search tasks are often inherently collaborative in nature, many search engines do not explicitly support collaboration during search. In this paper, we describe HeyStaks...
Kevin KcNally, Michael P. O'Mahony, Barry Smyth, M...
142
Voted
AVSS
2003
IEEE
15 years 9 months ago
Automatic Face Region Tracking for Highly Accurate Face Recognition in Unconstrained Environments
In this paper, we present a combined real-time face region tracking and highly accurate face recognition technique for an intelligent surveillance system. Highresolution face imag...
Young-Ouk Kim, Joon Ki Paik, Jingu Heo, Andreas Ko...
145
Voted
CIARP
2003
Springer
15 years 8 months ago
Online Handwritten Signature Verification Using Hidden Markov Models
Most people are used to signing documents and because of this, it is a trusted and natural method for user identity verification, reducing the cost of password maintenance and decr...
Juan J. Igarza, Iñaki Goirizelaia, Koldo Es...
127
Voted
EUROCRYPT
2003
Springer
15 years 8 months ago
Algebraic Attacks on Stream Ciphers with Linear Feedback
A classical construction of stream ciphers is to combine several LFSRs and a highly non-linear Boolean function f. Their security is usually analysed in terms of correlation attack...
Nicolas Courtois, Willi Meier
« Prev « First page 1098 / 1311 Last » Next »