Sciweavers

661 search results - page 105 / 133
» Distributed and Secure Access Control in P2P Databases
Sort
View
SAC
2010
ACM
13 years 8 months ago
The 'Dresden Image Database' for benchmarking digital image forensics
This paper introduces and documents a novel image database specifically built for the purpose of development and benchmarking of camera-based digital forensic techniques. More th...
Thomas Gloe, Rainer Böhme
ICASSP
2010
IEEE
13 years 10 months ago
Privacy and security of features extracted from minutiae aggregates
This paper describes our recent analysis on the security and privacy of biometric feature vectors obtained from fingerprint minutiae. A large number of contiguous regions (cuboid...
Abhishek Nagar, Shantanu Rane, Anthony Vetro
ICIP
2009
IEEE
14 years 11 months ago
Secure Distortion Computation Among Untrusting Parties Using Homomorphic Encryption
Alice and Bob possess sequences xn and yn respectively and would like to compute d(xn , yn ) where d(., .) is a distortion measure. However, Alice and Bob do not trust each other ...
CAI
2002
Springer
13 years 10 months ago
The Computing and Data Grid Approach: Infrastructure for Distributed Science Applications
Grid technology has evolved over the past several years to provide the services and infrastructure needed for building "virtual" systems and organizations. With this Gri...
William E. Johnston
SIGMOD
2003
ACM
179views Database» more  SIGMOD 2003»
14 years 3 months ago
Data Grid Management Systems
: The “Grid” is an emerging infrastructure for coordinating access across autonomous organizations to distributed, heterogeneous computation and data resources. Data grids are ...
Arun Jagatheesan, Arcot Rajasekar