Sciweavers

8381 search results - page 1580 / 1677
» The security of machine learning
Sort
View
MLMI
2005
Springer
15 years 6 months ago
Can Chimeric Persons Be Used in Multimodal Biometric Authentication Experiments?
Combining multiple information sources, typically from several data streams is a very promising approach, both in experiments and to some extents in various real-life applications....
Norman Poh, Samy Bengio
168
Voted
VLDB
2007
ACM
295views Database» more  VLDB 2007»
15 years 6 months ago
From Data Privacy to Location Privacy: Models and Algorithms
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in ...
Ling Liu
98
Voted
WPES
2003
ACM
15 years 5 months ago
Reusable anonymous return channels
Mix networks are used to deliver messages anonymously to recipients, but do not straightforwardly allow the recipient of an anonymous message to reply to its sender. Yet the abili...
Philippe Golle, Markus Jakobsson
CCS
2003
ACM
15 years 5 months ago
Cryptographic tamper evidence
We propose a new notion of cryptographic tamper evidence. A tamper-evident signature scheme provides an additional procedure Div which detects tampering: given two signatures, Div...
Gene Itkis
WSE
2002
IEEE
15 years 5 months ago
Laying the Foundation for Web Services over Legacy Systems
As the use of the World Wide Web becomes more pervasive within our society, businesses and institutions are required to migrate a wide range of services to the web. Difficulties a...
Janet Lavery, Cornelia Boldyreff, Bin Ling, Colin ...
« Prev « First page 1580 / 1677 Last » Next »