Sciweavers

5665 search results - page 92 / 1133
» Introduction to Computer Security
Sort
View
FC
2005
Springer
98views Cryptology» more  FC 2005»
14 years 2 months ago
Secure Biometric Authentication for Weak Computational Devices
This paper presents computationally “lightweight” schemes for performing biometric authentication that carry out the comparison stage without revealing any information that can...
Mikhail J. Atallah, Keith B. Frikken, Michael T. G...
IEEESP
2010
91views more  IEEESP 2010»
13 years 6 months ago
Security and Privacy Challenges in Cloud Computing Environments
Hassan Takabi, James B. D. Joshi, Gail-Joon Ahn
FC
2005
Springer
83views Cryptology» more  FC 2005»
14 years 2 months ago
Secure Distributed Human Computation
We suggest a general paradigm of using large-scale distributed computation to solve difficult problems, but where humans can act as agents and provide candidate solutions. We are e...
Craig Gentry, Zulfikar Ramzan, Stuart G. Stubblebi...