Sciweavers

1335 search results - page 104 / 267
» Privacy in Database Publishing
Sort
View
SIGMOD
2006
ACM
161views Database» more  SIGMOD 2006»
16 years 4 months ago
Paper-based mobile access to databases
Our demonstration is a paper-based interactive guide for visitors to the world's largest international arts festival that was developed as part of a project investigating new...
Beat Signer, Moira C. Norrie, Michael Grossniklaus...
ICMCS
2010
IEEE
178views Multimedia» more  ICMCS 2010»
15 years 5 months ago
Optimal configuration of hash table based multimedia fingerprint databases using weak bits
The increasingly large amount of digital multimedia content has created a need for technologies to search and identify multimedia files. Multimedia fingerprinting has been widely ...
Claus Bauer, Regunathan Radhakrishnan, Wenyu Jiang
WISA
2007
Springer
15 years 10 months ago
Iteration Bound Analysis and Throughput Optimum Architecture of SHA-256 (384, 512) for Hardware Implementations
Abstract. The hash algorithm forms the basis of many popular cryptographic protocols and it is therefore important to find throughput optimal implementations. Though there have be...
Yong Ki Lee, Herwin Chan, Ingrid Verbauwhede
ACSAC
2005
IEEE
15 years 9 months ago
Layering Public Key Distribution Over Secure DNS using Authenticated Delegation
We present the Internet Key Service (IKS), a distributed architecture for authenticated distribution of public keys, layered on Secure DNS (DNSSEC). Clients use DNSSEC to securely...
John P. Jones, Daniel F. Berger, Chinya V. Ravisha...
142
Voted
ACSAC
2001
IEEE
15 years 7 months ago
A Component-Based Architecture for Secure Data Publication
We present an approach for controlling access to data publishers in the framework of Web-based information services. The paper presents a model for enforcing access control regula...
Piero A. Bonatti, Ernesto Damiani, Sabrina De Capi...