Sciweavers

521 search results - page 46 / 105
» Scalable Secure Multiparty Computation
Sort
View
CSE
2009
IEEE
14 years 2 months ago
Designing Privacy for Scalable Electronic Healthcare Linkage
—A unified electronic health record (EHR) has potentially immeasurable benefits to society, and the current healthcare industry drive to create a single EHR reflects this. Howeve...
Anthony Stell, Richard O. Sinnott, Oluwafemi Ajayi...
SACMAT
2011
ACM
12 years 10 months ago
xDAuth: a scalable and lightweight framework for cross domain access control and delegation
Cross domain resource sharing and collaborations have become pervasive in today’s service oriented organizations. Existing approaches for the realization of cross domain access ...
Masoom Alam, Xinwen Zhang, Kamran Khan, Gohar Ali
ICPPW
2009
IEEE
14 years 2 months ago
Audio-Based Self-Organizing Authentication for Pervasive Computing: A Cyber-Physical Approach
—Pervasive computing is fast becoming a reality with rapid advance in computing and networking technologies. It has the characteristics of scalability, invisibility, and the abse...
Su Jin Kim, Sandeep K. S. Gupta
EUROCAST
2007
Springer
108views Hardware» more  EUROCAST 2007»
14 years 2 months ago
A Systems Theoretic Approach to the Design of Scalable Cryptographic Hash Functions
Cryptographic hash functions are security primitives that compute check sums of messages in a strong manner and this way are of fundamental importance for ensuring integrity and au...
Josef Scharinger
NCA
2006
IEEE
14 years 2 months ago
A Multipolicy Authorization Framework for Grid Security
A Grid system is a Virtual Organization that is composed of several autonomous domains. Authorization in such a system needs to be flexible and scalable to support multiple securi...
Bo Lang, Ian T. Foster, Frank Siebenlist, Rachana ...