Sciweavers

1663 search results - page 134 / 333
» Privacy and Identity Management
Sort
View
123
Voted
IMAGING
2004
15 years 6 months ago
Validation of Color Managed 3D Appearance Acquisition
Image-based appearance acquisition algorithms are able to generate realistic 3D models of real objects but have previously not taken care of calibrated color space. We integrate a...
Michael Goesele, Hendrik P. A. Lensch, Hans-Peter ...
PST
2004
15 years 6 months ago
Structural Concepts for Trust, Contract and Security Management for a Virtual Chemical Engineering Organisation
The paper reports on ongoing research into the development of a management system to co-ordinate a set of activities of a virtual organisation for the production of chemicals. The...
Panayiotis Periorellis, Christopher J. W. Townson,...
ICICS
1997
Springer
15 years 8 months ago
Secure document management and distribution in an open network environment
Abstract. This paper analyzes the problem of secure document management and distribution in an open network environment. Reader and author authentication, document integrity, origi...
Antonio Lioy, Fabio Maino, Marco Mezzalama
137
Voted
ISI
2008
Springer
15 years 4 months ago
Probabilistic frameworks for privacy-aware data mining
Often several cooperating parties would like to have a global view of their joint data for various data mining objectives, but cannot reveal the contents of individual records due...
Joydeep Ghosh
ICCAD
2007
IEEE
139views Hardware» more  ICCAD 2007»
16 years 1 months ago
Remote activation of ICs for piracy prevention and digital right management
— We introduce a remote activation scheme that aims to protect integrated circuits (IC) intellectual property (IP) against piracy. Remote activation enables designers to lock eac...
Yousra Alkabani, Farinaz Koushanfar, Miodrag Potko...