نتایج جستجو برای: middle vault

تعداد نتایج: 158270  

1999
Charles J. Antonelli M. Undy Peter Honeyman

This paper describes the packet vault, a cryptographically secured archiver of network packet data. The vault captures network packets, encrypts them, and writes them to long-term CD-ROM storage for later analysis and for evidentiary purposes. The cryptographic organization of the vault permits selected traffic to be made available without exposing other traffic.

2009
Gevorg Margarov Maha Tolba

In this paper a method for the biometric based secret sharing problem using the fuzzy vault construct is described. The secret is protected using the biometric data of the sharing parties, revealing a secret when a predetermined number of the sharing parties collaborate. The distinction between biometric cryptosystems is discussed. The basic idea of the fuzzy vault scheme is discussed. Finally ...

2014
Ismeet Kaur Ajay Mittal Manvjeet Kaur

Security of a biometric system is of paramount importance considering increased commercial use for allowing access to sensitive areas. In this context protection of stored biometric templates is of particular interest as these templates are irrevocable once leaked. Fuzzy vault has emerged as a novel cryptographic construct for the protection of biometric templates. But like every other techniqu...

2007
Karthik Nandakumar Abhishek Nagar Anil K. Jain

Security of stored templates is a critical issue in biometric systems because biometric templates are non-revocable. Fuzzy vault is a cryptographic framework that enables secure template storage by binding the template with a uniformly random key. Though the fuzzy vault framework has proven security properties, it does not provide privacy-enhancing features such as revocability and protection a...

Journal: :Molecular and cellular biology 2004
Yie Liu Bryan E Snow Valerie A Kickhoefer Natalie Erdmann Wen Zhou Andrew Wakeham Marla Gomez Leonard H Rome Lea Harrington

Vault poly(ADP-ribose) polymerase (VPARP) was originally identified as a minor protein component of the vault ribonucleoprotein particle, which may be involved in molecular assembly or subcellular transport. In addition to the association of VPARP with the cytoplasmic vault particle, subpopulations of VPARP localize to the nucleus and the mitotic spindle, indicating that VPARP may have other ce...

2015
Cha Hien Choi Jeong Jin Kim Woo Young Kim Kyeung Whan Min Dong Hoon Kim

A 45-year-old woman with a prior history of hysterectomy due to adenomyosis and leiomyomas was presented at our outpatient gynecology clinic 13 months later with sudden lower pelvic discomfort and vaginal bleeding symptoms. The patient underwent vaginal vault biopsy however diagnosis was still uncertain. Additional evaluation was required due to massive rebleeding incidents. After an emergent e...

2005
Qiong Li Xiamu Niu Zhifang Wang Yuhua Jiao Sheng-He Sun

By adopting a non-interactive information-theoretic secure verifiable secret sharing scheme in an unorthodox way, a verifiable fingerprint vault scheme is presented in this paper. Fuzzy vault scheme is a novel cryptographic construct which can increase the security of the biometric template in a biometric authentication system. It can be also used to bind the cryptographic key and the user in a...

Journal: :The EMBO Journal 2009
Jordi Querol-Audí Arnau Casañas Isabel Usón Daniel Luque José R Castón Ignasi Fita Nuria Verdaguer

Vaults are ubiquitous ribonucleoprotein complexes involved in a diversity of cellular processes, including multidrug resistance, transport mechanisms and signal transmission. The vault particle shows a barrel-shaped structure organized in two identical moieties, each consisting of 39 copies of the major vault protein MVP. Earlier data indicated that vault halves can dissociate at acidic pH. The...

2008
Hoi Ting Poon Ali Miri

The Fuzzy Vault scheme is an encryption scheme, which can tolerate errors in the keys. This leads to the possibility of enhancing the security in environments where these errors can be common, such as biometrics storage systems. Although several researchers have provided implementations, we find that the scheme is vulnerable to attacks when not properly used. This paper describes an attack on t...

Journal: :Singapore medical journal 2013
Wei-Wei Wee Heng Fok Wong Lih Charn Lee How Chuan Han

INTRODUCTION We aimed to evaluate the local incidences of hydronephrosis and renal impairment in the presence of severe uterovaginal or vault prolapse, and determine whether treatment by surgery or ring pessary resulted in the resolution of hydronephrosis in these patients. METHODS This was a retrospective case study of 121 patients who presented with severe uterovaginal or vault prolapse. Al...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید