Sciweavers

97 search results - page 10 / 20
» Beyond Just Data Privacy
Sort
View
ACNS
2008
Springer
143views Cryptology» more  ACNS 2008»
14 years 2 months ago
On the Security of the CCM Encryption Mode and of a Slight Variant
In this paper, we present an analysis of the CCM mode of operations and of a slight variant. CCM is a simple and efficient encryption scheme which combines a CBC-MAC authentication...
Pierre-Alain Fouque, Gwenaëlle Martinet, Fr&e...
INFOVIS
1997
IEEE
14 years 7 days ago
A spreadsheet approach to information visualization
In information visualization, as the volume and complexity of the data increases, researchers require more powerful visualization tools that enable them to more effectively explor...
Ed Huai-hsin Chi, Phillip Barry, John Riedl, Josep...
ACSAC
2002
IEEE
14 years 1 months ago
Security of Internet Location Management
In the Mobile IPv6 protocol, the mobile node sends binding updates to its correspondents to inform them about its current location. It is well-known that the origin of this locati...
Tuomas Aura, Michael Roe, Jari Arkko
EDBT
2011
ACM
222views Database» more  EDBT 2011»
12 years 11 months ago
The hidden web, XML and the Semantic Web: scientific data management perspectives
The World Wide Web no longer consists just of HTML pages. Our work sheds light on a number of trends on the Internet that go beyond simple Web pages. The hidden Web provides a wea...
Fabian M. Suchanek, Aparna S. Varde, Richi Nayak, ...
SP
1996
IEEE
121views Security Privacy» more  SP 1996»
14 years 6 days ago
A Security Policy Model for Clinical Information Systems
The protection of personal health information has become a live issue in a number of countries including the USA, Canada, Britain and Germany. The debate has shown that there is w...
Ross J. Anderson