Sciweavers

15379 search results - page 18 / 3076
» Protecting users from
Sort
View
SAC
2004
ACM
14 years 29 days ago
Protected transmission of biometric user authentication data for oncard-matching
Since fingerprint data are no secrets but of public nature, the verification data transmitted to a smartcard for oncardmatching need protection by appropriate means in order to ...
Ulrich Waldmann, Dirk Scheuermann, Claudia Eckert
PERCOM
2008
ACM
14 years 7 months ago
Protecting Users' Anonymity in Pervasive Computing Environments
The large scale adoption of adaptive services in pervasive and mobile computing is likely to be conditioned to the availability of reliable privacy-preserving technologies. Unfort...
Linda Pareschi, Daniele Riboni, Claudio Bettini
ICIP
2006
IEEE
14 years 9 months ago
Optimal Unequal Error Protection with User Cooperation for Transmission of Embedded Source-Coded Images
This paper studies the transmission of images encoded using an embedded source encoder over a wireless network allowing user cooperation. A dynamic programming algorithm is applie...
Andres Kwasinski, K. J. Ray Liu
PET
2004
Springer
14 years 27 days ago
Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments
Abstract. In a Ubiquitous Computing environment, sensors are actively collecting data, much of which can be very sensitive. Data will often be streaming at high rates (video and au...
Yitao Duan, John F. Canny
IJCAI
2003
13 years 9 months ago
A Semantic-Based User Privacy Protection Framework for Web Services
Abstract. Web service technology is an Internet-based distributed computing paradigm to address interoperability in heterogeneous distributed systems. In this paper, we present a p...
Arif Tumer, Asuman Dogac, Ismail Hakki Toroslu