Sciweavers

3272 search results - page 480 / 655
» Privacy in Data Publishing
Sort
View
ICALP
2003
Springer
15 years 9 months ago
Secrecy in Untrusted Networks
We investigate the protection of migrating agents against the untrusted sites they traverse. The resulting calculus provides a formal framework to reason about protection policies ...
Michele Bugliesi, Silvia Crafa, Amela Prelic, Vlad...
ISI
2003
Springer
15 years 9 months ago
Active Database Systems for Monitoring and Surveillance
In many intelligence and security tasks it is necessary to monitor data in database in order to detect certain events or changes. Currently, database systems offer triggers to pro...
Antonio Badia
WISA
2009
Springer
15 years 9 months ago
EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment
We introduce low-cost hardware for performing non-invasive side-channel attacks on Radio Frequency Identication Devices (RFID) and develop techniques for facilitating a correlatio...
Timo Kasper, David Oswald, Christof Paar
HUC
2000
Springer
15 years 8 months ago
Using Handheld Devices in Synchronous Collaborative Scenarios
: In this paper we present a platform specially designed for groupware applications running on handheld devices. Common groupware platforms request desktop computers as underlying ...
Jörg Roth, Claus Unger
DIMEA
2008
137views Multimedia» more  DIMEA 2008»
15 years 6 months ago
Biometric tendency recognition and classification system: an artistic approach
The Biometric Tendency Recognition and Classification System is a software application that continuously measures a participant's physiological responses to a given image and...
Carlos Castellanos, Philippe Pasquier, Luther Thie...