Sciweavers

222 search results - page 38 / 45
» Secure Content Delivery using Key Composition
Sort
View
SPC
2005
Springer
14 years 1 months ago
Supporting Dynamically Changing Authorizations in Pervasive Communication Systems
In pervasive computing environments, changes in context may trigger changes in an individual’s access permissions. We contend that existing access control frameworks do not provi...
Adam J. Lee, Jodie P. Boyer, Chris Drexelius, Pras...
IJIEM
2010
171views more  IJIEM 2010»
13 years 6 months ago
eConsent: provenance, use and future role
The use of information technology to manage patient consent is an important emerging area of research in health data management. This paper identifies literature, technological ad...
Sophie Cockcroft
JSAC
2007
263views more  JSAC 2007»
13 years 7 months ago
An Empirical Study of the Coolstreaming+ System
—In recent years, there has been significant interest in adopting the Peer-to-Peer (P2P) technology for Internet live video streaming. There are primarily two reasons behind thi...
Bo Li, Susu Xie, Gabriel Yik Keung, Jiangchuan Liu...
CRYPTO
2006
Springer
112views Cryptology» more  CRYPTO 2006»
13 years 11 months ago
On Expected Constant-Round Protocols for Byzantine Agreement
In a seminal paper, Feldman and Micali (STOC '88) show an n-party Byzantine agreement protocol tolerating t < n/3 malicious parties that runs in expected constant rounds. H...
Jonathan Katz, Chiu-Yuen Koo
JCB
2006
138views more  JCB 2006»
13 years 7 months ago
Recognition and Classification of Histones Using Support Vector Machine
Histones are DNA-binding proteins found in the chromatin of all eukaryotic cells. They are highly conserved and can be grouped into five major classes: H1/H5, H2A, H2B, H3, and H4...
Manoj Bhasin, Ellis L. Reinherz, Pedro A. Reche