Sciweavers

574 search results - page 106 / 115
» Responsive Security for Stored Data
Sort
View
ICPR
2002
IEEE
14 years 13 days ago
Biometric Hash based on Statistical Features of Online Signatures
This paper presents a new approach to generate biometric hash values based on statistical features in online signature signals. Whilst the output of typical online signature verif...
Claus Vielhauer, Ralf Steinmetz, Astrid Mayerh&oum...
EDBT
2012
ACM
225views Database» more  EDBT 2012»
11 years 10 months ago
Differentially private search log sanitization with optimal output utility
Web search logs contain extremely sensitive data, as evidenced by the recent AOL incident. However, storing and analyzing search logs can be very useful for many purposes (i.e. in...
Yuan Hong, Jaideep Vaidya, Haibing Lu, Mingrui Wu
AAAI
2007
13 years 9 months ago
Using AI for e-Government Automatic Assessment of Immigration Application Forms
This paper describes an e-Government AI project that provides a range of intelligent AI services to support automated assessment of various types of applications submitted to an i...
Andy Hon Wai Chun
WWW
2005
ACM
14 years 8 months ago
ATMEN: a triggered network measurement infrastructure
Web performance measurements and availability tests have been carried out using a variety of infrastructures over the last several years. Disruptions in the Internet can lead to W...
Balachander Krishnamurthy, Harsha V. Madhyastha, O...
EDBTW
2010
Springer
14 years 2 months ago
Key escrow schemes with sliding window for privacy-aware anomaly detection system
Requirements for a traffic monitoring system can be very demanding as both privacy and performance aspects have to be taken into account jointly. Moreover, the legislation sets fo...
Esa Hyytiä, Ivan Gojmerac, Simone Teofili, Gi...