Sciweavers

2108 search results - page 334 / 422
» Encrypted
Sort
View
WOWMOM
2006
ACM
195views Multimedia» more  WOWMOM 2006»
15 years 8 months ago
Can I Add a Secure VoIP Call?
— Voice over IP is a major trend in applications for wireless networks, but even so it is not immune to the risks usually related with IP networks. Proposed solutions for VoIP se...
Arlen Nascimento, Alexandre Passito, Edjair de Sou...
WPES
2006
ACM
15 years 8 months ago
Private social network analysis: how to assemble pieces of a graph privately
Connections in distributed systems, such as social networks, online communities or peer-to-peer networks, form complex graphs. These graphs are of interest to scientists in field...
Keith B. Frikken, Philippe Golle
CCGRID
2005
IEEE
15 years 8 months ago
Increasing distributed storage survivability with a stackable RAID-like file system
We have designed a stackable file system called Redundant Array of Independent Filesystems (RAIF). It combines the data survivability properties and performance benefits of trad...
Nikolai Joukov, Abhishek Rai, Erez Zadok
CIBCB
2005
IEEE
15 years 8 months ago
An Internet-based Melanoma Diagnostic System - Toward the Practical Application
— In this paper, we report a practical application of world’s first internet-based melanoma diagnostic system. The system is now available from all over the world, 24 hours 36...
Hitoshi Iyatomi, Hiroshi Oka, Masahiro Hashimoto, ...
DATE
2005
IEEE
115views Hardware» more  DATE 2005»
15 years 8 months ago
Power Attack Resistant Cryptosystem Design: A Dynamic Voltage and Frequency Switching Approach
— A novel power attack resistant cryptosystem is presented in this paper. Security in digital computing and communication is becoming increasingly important. Design techniques th...
Shengqi Yang, Wayne Wolf, Narayanan Vijaykrishnan,...