Sciweavers

4413 search results - page 643 / 883
» Security for biometric data
Sort
View
INFORMATICALT
2002
69views more  INFORMATICALT 2002»
15 years 4 months ago
Improving the Information Rate of a Private-key Cryptosystem Based on Product Codes
Recently, Sun proposed a private-key encryption scheme based on the product codes with the capability of correcting a special type of structured errors. In this paper, we present a...
Hung-Min Sun
157
Voted
PAAMS
2010
Springer
15 years 2 months ago
Agents to Help Context-Aware System in Home Care
Context-aware systems capture information from the attributes located within their surroundings and deal with different ways of interacting with the user in its environment. This p...
Juan A. Fraile, Dante I. Tapia, Jesús A. Ro...
144
Voted
MP
2010
132views more  MP 2010»
14 years 11 months ago
Exploiting group symmetry in semidefinite programming relaxations of the quadratic assignment problem
We consider semidefinite programming relaxations of the quadratic assignment problem, and show how to exploit group symmetry in the problem data. Thus we are able to compute the b...
Etienne de Klerk, Renata Sotirov
154
Voted
CCS
2009
ACM
15 years 11 months ago
A new cell counter based attack against tor
Various low-latency anonymous communication systems such as Tor and Anoymizer have been designed to provide anonymity service for users. In order to hide the communication of user...
Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Dong Xu...
SOUPS
2009
ACM
15 years 11 months ago
How users use access control
Existing technologies for file sharing differ widely in the granularity of control they give users over who can access their data; achieving finer-grained control generally requ...
Diana K. Smetters, Nathan Good