Sciweavers

2217 search results - page 423 / 444
» A Data Privacy Taxonomy
Sort
View
90
Voted
ATAL
2009
Springer
15 years 4 months ago
Directing Status Messages to Their Audience in Online Communities
In this paper we present the results of our user study about status message sharing on the Social Web. The study revealed the privacy and information noise (sometimes originating f...
Milan Stankovic, Alexandre Passant, Philippe Laubl...
158
Voted
CIIA
2009
15 years 4 months ago
Sharing and Protecting Networked Digital Life Memories
The increasing power of computers, increasing capacity of digital memory and wider availability of a great variety of input devices such as cameras and video recorders, has resulte...
Madjid Merabti
132
Voted
ADHOC
2007
130views more  ADHOC 2007»
15 years 3 months ago
Implementation of security policy for clinical information systems over wireless sensor networks
Various healthcare areas such as diagnosis, surgery, intensive care and treatment, and patient monitoring in general, would greatly benefit from light, autonomous devices which c...
Jelena V. Misic, Vojislav B. Misic
133
Voted
CORR
2010
Springer
114views Education» more  CORR 2010»
15 years 3 months ago
Integrating identity-based cryptography in IMS service authentication
Nowadays, the IP Multimedia Subsystem (IMS) is a promising research field. Many ongoing works related to the security and the performances of its employment are presented to the r...
Mohamed Abid, Songbo Song, Hassnaa Moustafa, Hossa...
153
Voted
CORR
2008
Springer
187views Education» more  CORR 2008»
15 years 3 months ago
Securing U-Healthcare Sensor Networks using Public Key Based Scheme
Recent emergence of electronic culture uplifts healthcare facilities to a new era with the aid of wireless sensor network (WSN) technology. Due to the sensitiveness of medical data...
Md. Mokammel Haque, Al-Sakib Khan Pathan, Choong S...