Sciweavers

497 search results - page 47 / 100
» Privacy Enhanced Technologies: Methods - Markets - Misuse
Sort
View
DIM
2005
ACM
15 years 6 months ago
Establishing and protecting digital identity in federation systems
We develop solutions for the security and privacy of user identity information in a federation. By federation we mean a group of organizations or service providers which have buil...
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...
IHI
2010
160views Healthcare» more  IHI 2010»
14 years 11 months ago
Securing the e-health cloud
Modern information technology is increasingly used in healthcare with the goal to improve and enhance medical services and to reduce costs. In this context, the outsourcing of com...
Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy
BIOADIT
2006
Springer
15 years 8 months ago
Resilient Multi-path Routing Based on a Biological Attractor Selection Scheme
In this paper we propose a resilient scheme for multi-path routing using a biologically-inspired attractor selection method. The main advantage of this approach is that it is highl...
Kenji Leibnitz, Naoki Wakamiya, Masayuki Murata
SIGIR
2008
ACM
15 years 4 months ago
Parsimonious relevance models
We describe a method for applying parsimonious language models to re-estimate the term probabilities assigned by relevance models. We apply our method to six topic sets from test ...
Edgar Meij, Wouter Weerkamp, Krisztian Balog, Maar...
PERCOM
2008
ACM
15 years 4 months ago
Randomized Bit Encoding for Stronger Backward Channel Protection in RFID Systems
In this paper, we introduce a randomized bit encoding scheme that can strengthen the privacy protection on RFID tags. This scheme is used together with the backward channel protec...
Tong-Lee Lim, Tieyan Li, Sze-Ling Yeo