Sciweavers

1398 search results - page 45 / 280
» Medical Database Security
Sort
View
COMCOM
2000
79views more  COMCOM 2000»
13 years 7 months ago
Jikzi - a new framework for security policy, trusted publishing and electronic commerce
In this paper, we describe a thread of research which we have followed off and on at Cambridge for about three years. Our topic is the security of electronic documents, in the bro...
Ross J. Anderson, Jong-Hyeon Lee
DEXAW
2009
IEEE
93views Database» more  DEXAW 2009»
13 years 11 months ago
The Secure Pipes and Filters Pattern
Many applications process or transform a stream of data. Such applications are organized as a sequence of different stages, which may be independent enough to be simultaneously car...
Eduardo B. Fernandez, Jorge L. Ortega-Arjona
ICMCS
2007
IEEE
164views Multimedia» more  ICMCS 2007»
14 years 2 months ago
Medical Visual Information Retrieval: State of the Art and Challenges Ahead
Today’s medical institutions produce enormous amounts of data on patients, including multimedia data, which is increasingly produced in digital form. These data in their clinica...
Henning Müller, Xin Zhou, Adrien Depeursinge,...
FC
2001
Springer
94views Cryptology» more  FC 2001»
14 years 6 days ago
Mutual Authentication for Low-Power Mobile Devices
We propose methods for mutual authentication and key exchange. Our methods are well suited for applications with strict power consumption restrictions, such as wireless medical imp...
Markus Jakobsson, David Pointcheval
CLEF
2008
Springer
13 years 9 months ago
Overview of the ImageCLEFmed 2008 Medical Image Retrieval Task
2008 was the fifth year for the medical image retrieval task of ImageCLEF, one of the most popular tracks within CLEF. Participation continued to increase in 2008. A total of 15 g...
Henning Müller, Jayashree Kalpathy-Cramer, Ch...