Regulations in various countries permit the reuse of health information without patient authorization provided the data is "de-identified". In the United States, for ins...
Unlike the common belief that knowledge flows mainly along the formal organizational hierarchy, recent research has pointed out an informal social network among organizational mem...
Young-Gul Kim, Sung-Byung Yang, Yong-Sauk Hau, Jeo...
Cross-domain information exchange is a growing problem, as business and governmental organizations increasingly need to integrate their information systems with those of partially...
Sensor nodes are often organized into clusters to facilitate many network operations such as data aggregation. Clustering has to be protected in hostile environments. Otherwise, a...
The widespread use of the Internet makes software piracy and unauthorized modification easier and more frequent. Among the many techniques developed for protecting software copyr...