Sciweavers

8701 search results - page 66 / 1741
» Protecting information on the Web
Sort
View
FTDCS
1999
IEEE
14 years 2 months ago
Protecting Competitive Negotiation of Mobile Agents
The paradigm of mobile agents reached its popularity and attraction from typical application scenarios, which are located in the area of electronic commerce. In these common appli...
Hartmut Vogler, Axel Spriestersbach, Marie-Luise M...
MEDINFO
2007
122views Healthcare» more  MEDINFO 2007»
13 years 11 months ago
Protecting Privacy while Sharing Medical Data Between Regional Healthcare Entities
Economies of scale, corporate partnerships and a need to increase the efficiency of Information Technology in the Healthcare sector are leading to the construction of Regional Hea...
Tyrone Grandison, Srivatsava Ranjit Ganta, Uri Bra...
CLUSTER
2004
IEEE
13 years 9 months ago
Performance Evaluation of Shared Mesh Protection in WDM Networks
The efficient use of network capacity in shared restoration schemes strongly depends upon the path selection procedure. In this paper we propose and evaluate path selection algorit...
Chadi Assi, Ahmad Khalil, Nasir Ghani, Abdallah Sh...
INFOCOM
2012
IEEE
12 years 12 days ago
Phantom: Physical layer cooperation for location privacy protection
—Localization techniques that allow inferring the location of wireless devices directly from received signals have exposed mobile users to new threats. Adversaries can easily col...
Sangho Oh, Tam Vu, Marco Gruteser, Suman Banerjee
SIGMOD
2004
ACM
95views Database» more  SIGMOD 2004»
14 years 10 months ago
Logic-based Web Information Extraction
Georg Gottlob, Christoph Koch