Sciweavers

4413 search results - page 797 / 883
» Security for biometric data
Sort
View
158
Voted
SIGCOMM
2012
ACM
13 years 6 months ago
Measuring and fingerprinting click-spam in ad networks
Advertising plays a vital role in supporting free websites and smartphone apps. Click-spam, i.e., fraudulent or invalid clicks on online ads where the user has no actual interest ...
Vacha Dave, Saikat Guha, Yin Zhang
148
Voted
ISCA
2012
IEEE
212views Hardware» more  ISCA 2012»
13 years 6 months ago
TimeWarp: Rethinking timekeeping and performance monitoring mechanisms to mitigate side-channel attacks
Over the past two decades, several microarchitectural side channels have been exploited to create sophisticated security attacks. Solutions to this problem have mainly focused on ...
Robert Martin, John Demme, Simha Sethumadhavan
158
Voted
EDBT
2012
ACM
225views Database» more  EDBT 2012»
13 years 5 months ago
Differentially private search log sanitization with optimal output utility
Web search logs contain extremely sensitive data, as evidenced by the recent AOL incident. However, storing and analyzing search logs can be very useful for many purposes (i.e. in...
Yuan Hong, Jaideep Vaidya, Haibing Lu, Mingrui Wu
CVPR
2008
IEEE
16 years 5 months ago
Motion estimation for multi-camera systems using global optimization
We present a motion estimation algorithm for multicamera systems consisting of more than one calibrated camera securely attached on a moving object. So, they move all together, bu...
Hongdong Li, Jae-Hak Kim, Richard I. Hartley
ICIP
2007
IEEE
16 years 5 months ago
Three Dimensional Face Recognition using Wavelet Decomposition of Range Images
Interest in face recognition systems has increased significantly due to the emergence of significant commercial opportunities in surveillance and security applications. In this pa...
Sina Jahanbin, Hyohoon Choi, Alan C. Bovik, Kennet...