Sciweavers

1335 search results - page 174 / 267
» Privacy in Database Publishing
Sort
View
SIGMOD
2004
ACM
133views Database» more  SIGMOD 2004»
16 years 4 months ago
Robust key establishment in sensor networks
Secure communication guaranteeing reliability, authenticity, and privacy in sensor networks with active adversaries is a challenging research problem since asymmetric key cryptosy...
Yongge Wang
120
Voted
ADC
2009
Springer
141views Database» more  ADC 2009»
15 years 11 months ago
Event-based Communication for Location-based Service Collaboration
Location-based context-aware services for mobile users need to collaborate in disparate networks. Services come and go as the user moves and no central repository is available. Th...
Annika Hinze, Yann Michel, Lisa Eschner
ICDE
2007
IEEE
131views Database» more  ICDE 2007»
15 years 11 months ago
Enhancing Secured Service Interoperability with Decentralized Orchestration
Several current research efforts in business process modeling are investigating XML-based executable formal specification languages. The availability of the latter allows modeled...
Ustun Yildiz, Claude Godart
IEEEIAS
2007
IEEE
15 years 11 months ago
Protection of Mammograms Using Blind Steganography and Watermarking
As medical image databases are connected together through PACS, those medical images may suffer from security breaches if not protected. If a medical image is illegally obtained o...
Yue Li, Chang-Tsun Li, Chia-Hung Wei
ICB
2007
Springer
427views Biometrics» more  ICB 2007»
15 years 10 months ago
"3D Face": Biometric Template Protection for 3D Face Recognition
Abstract. In this paper we apply template protection to an authentication system based on 3D face data in order to protect the privacy of its users. We use the template protection ...
Emile J. C. Kelkboom, Berk Gökberk, Tom A. M....