Sciweavers

469 search results - page 30 / 94
» Using Secret Sharing for Searching in Encrypted Data
Sort
View
ICB
2007
Springer
135views Biometrics» more  ICB 2007»
14 years 1 months ago
Feeling Is Believing: A Secure Template Exchange Protocol
We use grip pattern based biometrics as a secure side channel to achieve pre-authentication in a protocol that sets up a secure channel between two hand held devices. The protocol ...
Ileana Buhan, Jeroen Doumen, Pieter H. Hartel, Ray...
BIB
2008
106views more  BIB 2008»
13 years 7 months ago
Biodiversity informatics: the challenge of linking data and the role of shared identifiers
A major challenge facing biodiversity informatics is integrating data stored in widely distributed databases. Initial efforts have relied on taxonomic names as the shared identifi...
Roderic D. M. Page
ASIAN
2006
Springer
116views Algorithms» more  ASIAN 2006»
13 years 11 months ago
Secrecy Analysis in Protocol Composition Logic
We present formal proof rules for inductive reasoning about the way that data transmitted on the network remains secret from a malicious attacker. Extending a compositional protoco...
Arnab Roy, Anupam Datta, Ante Derek, John C. Mitch...
ICMB
2006
IEEE
206views Business» more  ICMB 2006»
14 years 1 months ago
E-Pass Using DRM in Symbian v8 OS and TrustZone : Securing Vital Data on Mobile Devices
The mobile phone industry has established a large customer base market, providing a wide range of mobile applications from voice and data services to digital media such as digital...
Wan Huzaini Wan Hussin, Reuben Edwards, Paul Coult...
BNCOD
2008
83views Database» more  BNCOD 2008»
13 years 9 months ago
Finding Data Resources in a Virtual Observatory Using SKOS Vocabularies
Abstract. One problem faced by astronomers using the virtual observatory is finding which of the multitude of data resources is relevant for them. The current tool, VOExplorer, rel...
Alasdair J. G. Gray, Norman Gray, Iadh Ounis