Sciweavers

4413 search results - page 657 / 883
» Security for biometric data
Sort
View
OOPSLA
2007
Springer
15 years 10 months ago
Lost in translation: formalizing proposed extensions to c#
Current real-world software applications typically involve heavy use of relational and XML data and their query languages. Unfortunately object-oriented languages and database que...
Gavin M. Bierman, Erik Meijer, Mads Torgersen
MMSEC
2006
ACM
216views Multimedia» more  MMSEC 2006»
15 years 10 months ago
Exposing digital forgeries in video by detecting double MPEG compression
With the advent of sophisticated and low-cost video editing software, it is becoming increasingly easier to tamper with digital video. In addition, an ever-growing number of video...
Weihong Wang, Hany Farid
AINA
2005
IEEE
15 years 10 months ago
An Efficient Hierarchical Key Management Scheme Using Symmetric Encryptions
The concept of hierarchical access control is that a higher privileged user (or higher level) has the ability to access data in lower privileged user (or lower level). Hierarchica...
Chu-Hsing Lin, Wei Lee, Yi-Kang Ho
CW
2005
IEEE
15 years 10 months ago
A Capability-Based Transparent Cryptographic File System
Data on the file system in mobile internetworked working environments are exposed data to a number of threats ranging from physical theft of storage devices to industrial espiona...
Frank Graf, Stephen D. Wolthusen
ICCV
2005
IEEE
15 years 10 months ago
HMM Based Falling Person Detection Using Both Audio and Video
Automatic detection of a falling person in video is an important problem with applications in security and safety areas including supportive home environments and CCTV surveillance...
B. Ugur Töreyin, Yigithan Dedeoglu, A. Enis &...