Sciweavers

15379 search results - page 84 / 3076
» Protecting users from
Sort
View
IEEEMSP
2002
IEEE
14 years 20 days ago
Unequal error protection of embedded multimedia objects for packet-erasure channels
—The application of forward-error-correcting codes to data organized as multiple, independent multimedia objects and encoded with modern embedded coders is investigated. Capitali...
Marka Madhavi, James E. Fowler
MOBICOM
1997
ACM
13 years 12 months ago
A Protection Scheme for Mobile Agents on Java
: This paper describes a protection scheme for mobile agents implemented on a Java environment. In this scheme, access to objects is controlled by means of software capabilities th...
Daniel Hagimont, Leila Ismail
BIOID
2008
101views Biometrics» more  BIOID 2008»
13 years 9 months ago
Template Protection for On-Line Signature-Based Recognition Systems
Abstract. Security and privacy issues are considered as two of the major concerns related to the use of biometric data for authentication purposes. In this paper we propose two dif...
Emanuele Maiorana, Patrizio Campisi, Alessandro Ne...
BIOSIG
2009
104views Biometrics» more  BIOSIG 2009»
13 years 5 months ago
A Note on the Protection Level of Biometric Data in Electronic Passports
: Following regulations of the EU Council in 2004, the member states have deployed electronic passports according to ICAO standards. Such documents contain an embedded radio freque...
Harald Baier, Tobias Straub
DASFAA
2009
IEEE
129views Database» more  DASFAA 2009»
14 years 2 months ago
Towards Preference-Constrained k-Anonymisation
Abstract. In this paper, we propose a novel preference-constrained approach to k-anonymisation. In contrast to the existing works on kanonymisation which attempt to satisfy a minim...
Grigorios Loukides, Achilles Tziatzios, Jianhua Sh...