Sciweavers

2028 search results - page 149 / 406
» Deriving Relation Keys from XML Keys
Sort
View
121
Voted
SP
2009
IEEE
15 years 11 months ago
Privacy Weaknesses in Biometric Sketches
The increasing use of biometrics has given rise to new privacy concerns. Biometric encryption systems have been proposed in order to alleviate such concerns: rather than comparing...
Koen Simoens, Pim Tuyls, Bart Preneel
127
Voted
ASSETS
2004
ACM
15 years 10 months ago
Middleware to expand context and preview in hypertext
Movement, or mobility, is key to the accessibility, design, and usability of many hypermedia resources (websites); and key to good mobility is context and preview by probing. This...
Simon Harper, Carole A. Goble, Robert Stevens, Yel...
CARDIS
2006
Springer
146views Hardware» more  CARDIS 2006»
15 years 8 months ago
SEA: A Scalable Encryption Algorithm for Small Embedded Applications
Most present symmetric encryption algorithms result from a tradeoff between implementation cost and resulting performances. In addition, they generally aim to be implemented effici...
François-Xavier Standaert, Gilles Piret, Ne...
ICWSM
2008
15 years 6 months ago
Mining and Visualizing Online Web Content Using BAM: Brand Association Map
In this paper, we describe our Brand Association MapTM (BAM) tool which maps and visualizes the way consumers naturally think and talk about brands across billions of unaided conv...
Navot Akiva, Eliyahu Greitzer, Yakir Krichman, Jon...
SICHERHEIT
2008
15 years 6 months ago
A Cryptographic Biometric Authentication System based on Genetic Fingerprints
We specify a system for authentication and key derivation using genetic fingerprints which prevents the recovery of biometric information from data stored for verification. We pre...
Ulrike Korte, Michael Krawczak, Johannes Merkle, R...