Sciweavers

826 search results - page 107 / 166
» Medical Requirements for Data Protection
Sort
View
147
Voted
TDSC
2011
14 years 10 months ago
SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
—Anonymity has received increasing attention in the literature due to the users’ awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network s...
Jinyuan Sun, Chi Zhang, Yanchao Zhang, Yuguang Fan...
122
Voted
ESAS
2004
Springer
15 years 9 months ago
Secure AES Hardware Module for Resource Constrained Devices
Abstract. Low power consumption, low gate count, and high throughput are standard design criteria for cryptographic coprocessors designated for resource constrained devices such as...
Elena Trichina, Tymur Korkishko
128
Voted
JSAC
2010
172views more  JSAC 2010»
15 years 2 months ago
Cross-layer QoS-aware communication for ultra wide band wireless multimedia sensor networks
—Wireless Multimedia Sensor Networks (WMSNs) are distributed systems of wirelessly networked devices that allow retrieving video and audio streams, still images, and scalar senso...
Tommaso Melodia, Ian F. Akyildiz
185
Voted
TRUSTBUS
2010
Springer
15 years 2 months ago
Context-Aware Privacy Design Pattern Selection
:  Context-Aware Privacy Design Pattern Selection Siani Pearson, Yun Shen HP Laboratories HPL-2010-74 Privacy, Design Patterns, Context Awareness User-related contextual factors...
Siani Pearson, Yun Shen
129
Voted
MICCAI
2008
Springer
16 years 4 months ago
A Novel Explicit 2D+t Cyclic Shape Model Applied to Echocardiography
In this paper, we propose a novel explicit 2D+t cyclic shape model that extends the Point Distribution Model (PDM) to shapes like myocardial contours with cyclic dynamics. We also ...
Ramón Casero, J. Alison Noble