Sciweavers

4413 search results - page 744 / 883
» Security for biometric data
Sort
View
132
Voted
FLAIRS
2004
15 years 5 months ago
Finding Partners to Form Information Sharing Networks in Open Multi-Agent Systems
Information quality assurance despite the existence of uncertainty about sources can be investigated in the context of soft security where an agent maintains trustworthiness evalu...
K. Suzanne Barber, Jisun Park
ICIS
2001
15 years 5 months ago
Transaction Costs and Market Efficiency
Previous research suggests that a decline in transactions costs leads to improved economic efficiency. In this paper,weshowthatsuchadeclinewillintroduceincreasinglyuninformedconsu...
Bin Gu, Lorin M. Hitt
147
Voted
VIIP
2001
15 years 5 months ago
Visual Behavior Characterization for Intrusion Detection in Large Scale Systems
This work focuses on the visual representation of relations towards aiding the exploration and analysis of network intrusions. Fundamentally, the visual representations aid an ana...
Robert F. Erbacher
140
Voted
VIP
2001
15 years 5 months ago
Web-based Image Authentication Using Invisible Fragile Watermark
The demand of security is getting higher in these days due to easy reproduction of digitally created multimedia data. Digital watermark is the emerging technique to embed secret i...
Yusuk Lim, Changsheng Xu, David Dagan Feng
168
Voted
IMAMS
2003
212views Mathematics» more  IMAMS 2003»
15 years 5 months ago
Watermarking 3D Polygonal Meshes Using the Singular Spectrum Analysis
Watermarking is to embed a structure called a watermark into the target data such as images. The watermark can be used, for example, in order to secure the copyright and detect tam...
Kohei Muratani, Kokichi Sugihara