Sciweavers

574 search results - page 42 / 115
» Responsive Security for Stored Data
Sort
View
ICB
2007
Springer
164views Biometrics» more  ICB 2007»
13 years 11 months ago
Hardening Fingerprint Fuzzy Vault Using Password
Security of stored templates is a critical issue in biometric systems because biometric templates are non-revocable. Fuzzy vault is a cryptographic framework that enables secure te...
Karthik Nandakumar, Abhishek Nagar, Anil K. Jain
DAC
2004
ACM
14 years 8 months ago
Security as a new dimension in embedded system design
The growing number of instances of breaches in information security in the last few years has created a compelling case for efforts towards secure electronic systems. Embedded sys...
Srivaths Ravi, Paul C. Kocher, Ruby B. Lee, Gary M...
ICDE
2009
IEEE
255views Database» more  ICDE 2009»
14 years 9 months ago
Database Management as a Service: Challenges and Opportunities
Data outsourcing or database as a service is a new paradigm for data management in which a third party service provider hosts a database as a service. The service provides data man...
Ahmed Metwally, Amr El Abbadi, Divyakant Agrawal, ...
CLUSTER
2008
IEEE
14 years 2 months ago
Reliable adaptable Network RAM
Abstract—We present reliability solutions for adaptable Network RAM systems running on general-purpose clusters. Network RAM allows nodes with over-committed memory to swap pages...
Tia Newhall, Daniel Amato, Alexandr Pshenichkin
CCS
2011
ACM
12 years 7 months ago
How to break XML encryption
XML Encryption was standardized by W3C in 2002, and is implemented in XML frameworks of major commercial and open-source organizations like Apache, redhat, IBM, and Microsoft. It ...
Tibor Jager, Somorovsky Juraj