Sciweavers

3452 search results - page 136 / 691
» Secure Data Outsourcing
Sort
View
SWWS
2008
15 years 4 months ago
A proposal for Ontology Security Standards
- Semantic technologies, such as RDF (Resource Description Framework) and OWL (Web Ontology Language), are being widely used to store information. Ontology is mostly used in semant...
Muhammad Reza Fatemi, Atilla Elçi, Zeki Bay...
CORR
2008
Springer
72views Education» more  CORR 2008»
15 years 3 months ago
Lossless Compression with Security Constraints
Secure distributed data compression in the presence of an eavesdropper is explored. Two correlated sources that need to be reliably transmitted to a legitimate receiver are availab...
Deniz Gündüz, Elza Erkip, H. Vincent Poo...
BIOSIG
2008
159views Biometrics» more  BIOSIG 2008»
15 years 4 months ago
Template Protection for PCA-LDA-based 3D Face Recognition Systems
: Authentication based on biometrics became significantly important over the last years. Privacy and security concerns arise by the extensive deployment of biometrics. The used bio...
Daniel Hartung
IBMRD
2007
47views more  IBMRD 2007»
15 years 2 months ago
Cell Broadband Engine processor vault security architecture
    Current data protection technologies such as those based on public‐key encryption and broadcast  encryption  focus  on  the  secure  control  and  prote...
Kanna Shimizu, H. Peter Hofstee, John S. Liberty
JAISE
2010
88views Algorithms» more  JAISE 2010»
14 years 9 months ago
Improving user verification by implementing an agent-based security system
Abstract. This paper presents an agent-based, high-level security system for user verification. The system verifies a user's identity by processing data from several low-lever...
Erik Dovgan, Bostjan Kaluza, Tea Tusar, Matjaz Gam...