Sciweavers

262 search results - page 7 / 53
» Secure Hamming Distance Based Computation and Its Applicatio...
Sort
View
ACNS
2007
Springer
112views Cryptology» more  ACNS 2007»
14 years 2 months ago
A New Protocol for Conditional Disclosure of Secrets and Its Applications
Many protocols that are based on homomorphic encryption are private only if a client submits inputs from a limited range S. Conditional disclosure of secrets (CDS) helps to overcom...
Sven Laur, Helger Lipmaa
MEDIAFORENSICS
2010
13 years 9 months ago
Alignment and bit extraction for secure fingerprint biometrics
Security of biometric templates stored in a system is important because a stolen template can compromise system security as well as user privacy. Therefore, a number of secure bio...
Abhishek Nagar, Shantanu Rane, Anthony Vetro
ICDE
2012
IEEE
252views Database» more  ICDE 2012»
11 years 10 months ago
Fuzzy Joins Using MapReduce
—Fuzzy/similarity joins have been widely studied in the research community and extensively used in real-world applications. This paper proposes and evaluates several algorithms f...
Foto N. Afrati, Anish Das Sarma, David Menestrina,...
RIAO
2000
13 years 9 months ago
Classification of Radiographs in the 'Image Retrieval in Medical Applications' - System
In this paper we present a new approach to classifying radiographs, which is the first important task of the IRMA system. Given an image, we compute posterior probabilities for ea...
Jörg Dahmen, Thomas Theiner, Daniel Keysers, ...
CCS
2008
ACM
13 years 10 months ago
Location privacy of distance bounding protocols
Distance bounding protocols have been proposed for many security critical applications as a means of getting an upper bound on the physical distance to a communication partner. As...
Kasper Bonne Rasmussen, Srdjan Capkun