Sciweavers

5488 search results - page 1047 / 1098
» On the Secure Implementation of Security Protocols
Sort
View
PAMI
2007
150views more  PAMI 2007»
15 years 3 months ago
Continuous Verification Using Multimodal Biometrics
—Conventional verification systems, such as those controlling access to a secure room, do not usually require the user to reauthenticate himself for continued access to the prote...
Terence Sim, Sheng Zhang, Rajkumar Janakiraman, Sa...
146
Voted
IEEESP
2010
126views more  IEEESP 2010»
15 years 2 months ago
Privacy-Preserving Sharing of Sensitive Information
The need for controlled sharing of sensitive information occurs in many realistic everyday scenarios, ranging from critical (e.g., national security) to mundane (e.g., social netw...
Salvatore J. Stolfo, Gene Tsudik
KES
2008
Springer
15 years 2 months ago
Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Data Base
Privacy is one of the most important properties of an information system must satisfy. In which systems the need to share information among different, not trusted entities, the pro...
Mahmoud Hussein, Ashraf El-Sisi, Nabil A. Ismail
IJIEM
2010
171views more  IJIEM 2010»
15 years 2 months ago
eConsent: provenance, use and future role
The use of information technology to manage patient consent is an important emerging area of research in health data management. This paper identifies literature, technological ad...
Sophie Cockcroft
130
Voted
INFOCOM
2010
IEEE
15 years 2 months ago
Safeguarding Data Delivery by Decoupling Path Propagation and Adoption
—False routing announcements are a serious security problem, which can lead to widespread service disruptions in the Internet. A number of detection systems have been proposed an...
Mingui Zhang, Bin Liu, Beichuan Zhang
« Prev « First page 1047 / 1098 Last » Next »