Sciweavers

738 search results - page 16 / 148
» Privacy Protection for Speech Information
Sort
View
MIE
2008
125views Healthcare» more  MIE 2008»
13 years 9 months ago
Knowledge Management for the Protection of Information in Electronic Medical Records
: This paper describes foundational work investigating the protection requirements of sensitive medical information, which is being stored more routinely in repository systems for ...
Nathan Lea, Stephen Hailes, Tony Austin, Dipak Kal...
ACSAC
2000
IEEE
14 years 4 days ago
Layering Boundary Protections: An Experiment in Information Assurance
The DARPA Information Assurance Program has the aim of developing and executing experiments that test specific hypotheses about defense in depth and dynamic defense capabilities. ...
D. Johnson, L. Benzinger
JCP
2006
118views more  JCP 2006»
13 years 7 months ago
A Method of An Anonymous Authentication For Flat-rate Service
As the ubiquitous society spreads rapidly, various private information circulates in large quantities. Information increases explosively in recent years, the importance of privacy ...
Yoshio Kakizaki, Hiroshi Yamamoto, Hidekazu Tsuji
ECAI
2008
Springer
13 years 9 months ago
Addressing Temporal Aspects of Privacy-Related Norms
Abstract. Agents interacting in open environments such as Internet are often in charge of personal information. In order to protect the privacy of human users, such agents have to ...
Guillaume Piolle, Yves Demazeau
HICSS
2007
IEEE
152views Biometrics» more  HICSS 2007»
14 years 2 months ago
Analyzing Online Information Privacy Concerns: An Information Processing Theory Approach
The advent of the Internet has made the transmission of personally identifiable information common and often inadvertent to the user. As a consequence, individuals worry that comp...
Il-Horn Hann, Kai Lung Hui, Sang-Yong Tom Lee, Iva...