Sciweavers

4413 search results - page 66 / 883
» Security for biometric data
Sort
View
ICPR
2000
IEEE
14 years 2 months ago
Acoustic and Facial Features for Speaker Recognition
This paper gives an insight into biometrics used for speaker recognition. Three different biometrics are presented, based on: acoustic, geometric lip, and holistic facial features...
Matthew Roach, Jason Brand, John S. Mason
SIGMOD
2010
ACM
227views Database» more  SIGMOD 2010»
14 years 2 months ago
SecureBlox: customizable secure distributed data processing
We present SecureBlox, a declarative system that uniļ¬es a distributed query processor with a security policy framework. SecureBlox decouples security concerns from system speciļ...
William R. Marczak, Shan Shan Huang, Martin Braven...
HICSS
2003
IEEE
134views Biometrics» more  HICSS 2003»
14 years 3 months ago
Secure Connections in Bluetooth Scatternets
Bluetooth is a wireless networking technology speciļ¬cally developed for Personal Area Networking and other short range applications. Bluetooth devices can be networked together ...
Karl E. Persson, D. Manivannan
ETFA
2005
IEEE
14 years 3 months ago
A security architecture for data privacy and security
Data access and software exchange are often achieved over insecure networks such as the public Internet. System designers are therefore forced to be proactive with regard to verif...
Alfred C. Weaver
CAU
2004
192views Cryptology» more  CAU 2004»
13 years 11 months ago
Encrypted? Randomised? Compromised? (When Cryptographically Secured Data is Not Secure)
Protecting data is not simply a case of encrypt and forget: even data with full cryptographic confidentiality and integrity protection can still be subject to information leakage. ...
Mike Bond, Jolyon Clulow