Sciweavers

1401 search results - page 144 / 281
» A Security Policy Model for Clinical Information Systems
Sort
View
MIA
2011
170views more  MIA 2011»
13 years 3 months ago
Robust statistical shape models for MRI bone segmentation in presence of small field of view
Accurate bone modeling from medical images is essential in the diagnosis and treatment of patients because it supports the detection of abnormal bone morphology, which is often re...
Jérôme Schmid, Jinman Kim, Nadia Magn...
JSAC
2006
181views more  JSAC 2006»
13 years 9 months ago
Information theoretic framework of trust modeling and evaluation for ad hoc networks
Abstract-- The performance of ad hoc networks depends on cooperation and trust among distributed nodes. To enhance security in ad hoc networks, it is important to evaluate trustwor...
Yan Lindsay Sun, Wei Yu, Zhu Han, K. J. Ray Liu
CCS
2007
ACM
14 years 3 months ago
Split-ballot voting: everlasting privacy with distributed trust
In this paper we propose a new voting protocol with desirable security properties. The voting stage of the protocol can be performed by humans without computers; it provides every...
Tal Moran, Moni Naor
CCS
2010
ACM
13 years 9 months ago
In search of an anonymous and secure lookup: attacks on structured peer-to-peer anonymous communication systems
The ability to locate random relays is a key challenge for peer-to-peer (P2P) anonymous communication systems. Earlier attempts like Salsa and AP3 used distributed hash table look...
Qiyan Wang, Prateek Mittal, Nikita Borisov
ACSAC
2005
IEEE
14 years 2 months ago
Securing Email Archives through User Modeling
Online email archives are an under-protected yet extremely sensitive information resource. Email archives can store years worth of personal and business email in an easy-to-access...
Yiru Li, Anil Somayaji