Sciweavers

169 search results - page 26 / 34
» Secure image retrieval through feature protection
Sort
View
PLDI
2012
ACM
13 years 2 days ago
Language-based control and mitigation of timing channels
We propose a new language-based approach to mitigating timing channels. In this language, well-typed programs provably leak only a bounded amount of information over time through ...
Danfeng Zhang, Aslan Askarov, Andrew C. Myers
WWW
2009
ACM
15 years 10 months ago
Collective privacy management in social networks
Social Networking is one of the major technological phenomena of the Web 2.0, with hundreds of millions of people participating. Social networks enable a form of self expression f...
Anna Cinzia Squicciarini, Mohamed Shehab, Federica...
GLOBECOM
2007
IEEE
15 years 4 months ago
Addressing the Weakness in a Lightweight RFID Tag-Reader Mutual Authentication Scheme
— A lightweight radio frequency identification (RFID) tag-reader mutual authentication scheme was recently proposed as an improvement over the original authentication protocol s...
Tong-Lee Lim, Tieyan Li
SSWMC
2004
14 years 11 months ago
Towards fraud-proof ID documents using multiple data hiding technologies and biometrics
Identity documents, such as ID cards, passports, and driver's licenses, contain textual information, a portrait of the legitimate holder, and eventually some other biometric ...
Justin Picard, Claus Vielhauer, Niels J. Thorwirth
63
Voted
ICIAP
2003
ACM
15 years 9 months ago
Old fashioned state-of-the-art image classification
In this paper we present a statistical learning scheme for image classification based on a mixture of old fashioned ideas and state of the art learning tools. We represent input i...
Annalisa Barla, Francesca Odone, Alessandro Verri