Sciweavers

4413 search results - page 730 / 883
» Security for biometric data
Sort
View
99
Voted
WWW
2006
ACM
16 years 4 months ago
Status of the African Web
As part of the Language Observatory Project [4], we have been crawling all the web space since 2004. We have collected terabytes of data mostly from Asian and African ccTLDs. In t...
Rizza Camus Caminero, Pavol Zavarsky, Yoshiki Mika...
130
Voted
OSDI
2006
ACM
16 years 4 months ago
Type-Safe Disks
We present the notion of a type-safe disk (TSD). Unlike a traditional disk system, a TSD is aware of the pointer relationships between disk blocks that are imposed by higher layer...
Gopalan Sivathanu, Swaminathan Sundararaman, Erez ...
NDSS
2009
IEEE
15 years 10 months ago
The Blind Stone Tablet: Outsourcing Durability to Untrusted Parties
We introduce a new paradigm for outsourcing the durability property of a multi-client transactional database to an untrusted service provider. Specifically, we enable untrusted s...
Peter Williams, Radu Sion, Dennis Shasha
122
Voted
IFIP
2009
Springer
15 years 10 months ago
Detecting Spam at the Network Level
Spam is increasingly a core problem affecting network security and performance. Indeed, it has been estimated that 80% of all email messages are spam. Content-based filters are a ...
Anna Sperotto, Gert Vliek, Ramin Sadre, Aiko Pras
128
Voted
IFIP
2009
Springer
15 years 10 months ago
Enhancing Progressive Encryption for Scalable Video Streams
The technique called progressive encryption is used in many areas of content security. However, the plain algorithm itself is only applicable in real transmission scenarios where n...
Viktor Gergely, Gábor Fehér