Sciweavers

661 search results - page 105 / 133
» Distributed and Secure Access Control in P2P Databases
Sort
View
SAC
2010
ACM
15 years 27 days ago
The 'Dresden Image Database' for benchmarking digital image forensics
This paper introduces and documents a novel image database specifically built for the purpose of development and benchmarking of camera-based digital forensic techniques. More th...
Thomas Gloe, Rainer Böhme
ICASSP
2010
IEEE
15 years 2 months ago
Privacy and security of features extracted from minutiae aggregates
This paper describes our recent analysis on the security and privacy of biometric feature vectors obtained from fingerprint minutiae. A large number of contiguous regions (cuboid...
Abhishek Nagar, Shantanu Rane, Anthony Vetro
ICIP
2009
IEEE
16 years 3 months ago
Secure Distortion Computation Among Untrusting Parties Using Homomorphic Encryption
Alice and Bob possess sequences xn and yn respectively and would like to compute d(xn , yn ) where d(., .) is a distortion measure. However, Alice and Bob do not trust each other ...
CAI
2002
Springer
15 years 2 months ago
The Computing and Data Grid Approach: Infrastructure for Distributed Science Applications
Grid technology has evolved over the past several years to provide the services and infrastructure needed for building "virtual" systems and organizations. With this Gri...
William E. Johnston
131
Voted
SIGMOD
2003
ACM
179views Database» more  SIGMOD 2003»
15 years 7 months ago
Data Grid Management Systems
: The “Grid” is an emerging infrastructure for coordinating access across autonomous organizations to distributed, heterogeneous computation and data resources. Data grids are ...
Arun Jagatheesan, Arcot Rajasekar