Sciweavers

269 search results - page 19 / 54
» Who Thinks Who Knows Who
Sort
View
HICSS
2008
IEEE
138views Biometrics» more  HICSS 2008»
14 years 1 months ago
Cyber Security and Government Fusion Centers
The Department of Homeland Security has recommended the creation of State, Regional, and Community Fusion Centers. These centers, run by state and local governments, are designed ...
Natalie Granado, Gregory White
SP
2008
IEEE
14 years 1 months ago
Robust De-anonymization of Large Sparse Datasets
We present a new class of statistical deanonymization attacks against high-dimensional micro-data, such as individual preferences, recommendations, transaction records and so on. ...
Arvind Narayanan, Vitaly Shmatikov
ACISP
2008
Springer
14 years 1 months ago
Secure Biometric Authentication with Improved Accuracy
Abstract. We propose a new hybrid protocol for cryptographically secure biometric authentication. The main advantages of the proposed protocol over previous solutions can be summar...
Manuel Barbosa, Thierry Brouard, Stéphane C...
FGCN
2007
IEEE
106views Communications» more  FGCN 2007»
14 years 1 months ago
Discovering Methodology and Scenario to Detect Covert Database System
When the digital forensic investigator looks into the suspicious organization including the company, it is important to obtain the data which has the overview of information of th...
Gu Taek Lee, Seokhee Lee, Elena Tsomko, Sangjin Le...
HICSS
2007
IEEE
110views Biometrics» more  HICSS 2007»
14 years 1 months ago
An Observational Study of Voters on the Internet
Voters in a democracy have the responsibility to learn about the candidates and issues on which they are deciding. The internet offers voters unparalleled opportunities for findin...
Scott P. Robertson, Christine E. Wania, Sang Joon ...