Sciweavers

574 search results - page 46 / 115
» Responsive Security for Stored Data
Sort
View
ACMSE
2009
ACM
13 years 5 months ago
A secure unidirectional proxy re-encryption using identity and secret key exchange
Proxy re-encryption, abbreviated as PRE, is a cryptosystem which allows the proxy to re-encrypt a cirphertext without accessing the underlying message. The re-encryption protocol ...
Edna Milgo
JMS
2010
139views more  JMS 2010»
13 years 6 months ago
Application of Portable CDA for Secure Clinical-document Exchange
Health Level Seven (HL7) organization published the Clinical Document Architecture (CDA) for exchanging documents among heterogeneous systems and improving medical quality based on...
Kuo-Hsuan Huang, Sung-huai Hsieh, Yuan-Jen Chang, ...
DIMEA
2008
137views Multimedia» more  DIMEA 2008»
13 years 9 months ago
Biometric tendency recognition and classification system: an artistic approach
The Biometric Tendency Recognition and Classification System is a software application that continuously measures a participant's physiological responses to a given image and...
Carlos Castellanos, Philippe Pasquier, Luther Thie...
ICPADS
2006
IEEE
14 years 1 months ago
Secure and High-Performance Web Server System for Shared Hosting Service
We developed Hi-sap, a web server system that ensures the security in a server and has high performance when processing dynamic content. In existing servers, server embedded progr...
Daisuke Hara, Yasuichi Nakayama
SRDS
2003
IEEE
14 years 27 days ago
Pesto Flavoured Security
We demonstrate that symmetric-key cryptography can be used for both read and write access control. One-time write access can be granted by handing over an encryption key, and our ...
Feike W. Dillema, Tage Stabell-Kulø