Sciweavers

738 search results - page 110 / 148
» Privacy Protection for Speech Information
Sort
View
ACSAC
2010
IEEE
13 years 7 months ago
FIRM: capability-based inline mediation of Flash behaviors
The wide use of Flash technologies makes the security risks posed by Flash content an increasingly serious issue. Such risks cannot be effectively addressed by the Flash player, w...
Zhou Li, XiaoFeng Wang
SODA
2010
ACM
164views Algorithms» more  SODA 2010»
14 years 6 months ago
Differentially Private Approximation Algorithms
Consider the following problem: given a metric space, some of whose points are "clients," select a set of at most k facility locations to minimize the average distance f...
Anupam Gupta, Katrina Ligett, Frank McSherry, Aaro...
GRC
2007
IEEE
14 years 3 months ago
Secure Similarity Search
— One of the most substantial ways to protect users’ sensitive information is encryption. This paper is about the keyword index search system on encrypted documents. It has bee...
Hyun-A Park, Bum Han Kim, Dong Hoon Lee, Yon Dohn ...
KES
2005
Springer
14 years 2 months ago
An Analysis on Accuracy of Cancelable Biometrics Based on BioHashing
Cancelable biometrics has been proposed for canceling and re-issuing biometric templates and for protecting privacy in biometrics systems. Recently, new cancelable biometric approa...
King Hong Cheung, Adams Wai-Kin Kong, David Zhang,...
ICPP
1999
IEEE
14 years 1 months ago
Mobile-Agents for Distributed Market Computing
This paper discusses the implementation using mobile agent and the performance of the market computing to allocate network quality of service most efficiently, based on users'...
Shinji Tanaka, Hirofumi Yamaki, Toru Ishida