Sciweavers

1686 search results - page 107 / 338
» Artful systems in the home
Sort
View
CRYPTO
2012
Springer
215views Cryptology» more  CRYPTO 2012»
12 years 18 days ago
New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques
We develop a new methodology for utilizing the prior techniques to prove selective security for functional encryption systems as a direct ingredient in devising proofs of full sec...
Allison B. Lewko, Brent Waters
VIP
2003
13 years 11 months ago
Web-based Multimedia GP Medical System
This paper introduced GP-Soft, a powerful new patient management system, which is designed to improve the records management for clinic, nursing home and hospital. GP-Soft is a co...
Chee Chern Lim, Man Hing Yu, Jesse J. Jin
CSREASAM
2006
13 years 11 months ago
Security Requirements for Multimodal Biometric Systems
Biometrics systems are automated systems that recognize a person based on physical or behavioral characteristics. There are a number of primary biometric disciplines including fin...
Kevin Daimi, Katherine Snyder
NDSS
2009
IEEE
14 years 4 months ago
Analyzing and Comparing the Protection Quality of Security Enhanced Operating Systems
Host compromise is a serious computer security problem today. To better protect hosts, several Mandatory Access Control systems, such as Security Enhanced Linux (SELinux) and AppA...
Hong Chen, Ninghui Li, Ziqing Mao
ICIW
2008
IEEE
14 years 4 months ago
NAT Traversal Method for Multi-Agent-Based Meeting Scheduling System
—We previously proposed a meeting scheduling system based on mobile agent technology. The users of our system do not need to input all of their schedules unlike the existing grou...
Yusuke Hamada, Shinichi Motomura, Takao Kawamura, ...