Sciweavers

650 search results - page 130 / 130
» Privacy in Non-private Environments
Sort
View
JITECH
2007
136views more  JITECH 2007»
13 years 8 months ago
A computer scientist's reactions to NPfIT
This paper contains a set of personal views relating to NHS Connecting for Health’s National Programme for IT (NPfIT), and in particular its Care Records Service, written from t...
Brian Randell
PUC
2008
141views more  PUC 2008»
13 years 8 months ago
MobGeoSen: facilitating personal geosensor data collection and visualization using mobile phones
Mobile sensing and mapping applications are becoming more prevalent because sensing hardware is becoming more portable and more affordable. However, most of the hardware uses small...
Eiman Kanjo, Steve Benford, Mark Paxton, Alan Cham...
TITB
2008
204views more  TITB 2008»
13 years 8 months ago
A Cryptographic Approach to Securely Share and Query Genomic Sequences
To support large-scale biomedical research projects, organizations need to share person-specific genomic sequences without violating the privacy of their data subjects. In the past...
Murat Kantarcioglu, Wei Jiang, Ying Liu, Bradley M...
IHI
2012
266views Healthcare» more  IHI 2012»
12 years 4 months ago
A software tool for large-scale sharing and querying of clinical documents modeled using HL7 version 3 standard
We present a novel software tool called CDN (Collaborative Data Network) for large-scale sharing and querying of clinical documents modeled using HL7 v3 standard (e.g., Clinical D...
Praveen R. Rao, Tivakar Komara Swami, Deepthi S. R...
IJNSEC
2007
110views more  IJNSEC 2007»
13 years 8 months ago
A Light Weight Enhancement to RC4 Based Security for Resource Constrained Wireless Devices
The Wired Equivalent Privacy (WEP) uses the 64 bit RC4 secret key stream cipher as its layer 2 security protocol. Although the underlying RC4 cipher is secure, the potential reuse...
Chetan Nanjunda Mathur, K. P. Subbalakshmi