Sciweavers

1120 search results - page 102 / 224
» Securely sharing neuroimagery
Sort
View
SIGOPSE
2004
ACM
14 years 4 months ago
Reducing TCB size by using untrusted components: small kernels versus virtual-machine monitors
Secure systems are best built on top of a small trusted operating system: The smaller the operating system, the easier it can be assured or verified for correctness. In this pape...
Michael Hohmuth, Michael Peter, Hermann Härti...
ICIP
2003
IEEE
15 years 24 days ago
Halftone visual cryptography
This paper considers the problem of encoding a secret binary image SI into n shares of meaningful halftone images within the scheme of visual cryptography (VC). Secret pixels enco...
Z. Zhou, Gonzalo R. Arce, Giovanni Di Crescenzo
VLDB
2006
ACM
122views Database» more  VLDB 2006»
14 years 11 months ago
A secure distributed framework for achieving k-anonymity
k-anonymity provides a measure of privacy protection by preventing re-identification of data to fewer than a group of k data items. While algorithms exist for producing k-anonymous...
Wei Jiang, Chris Clifton
ICYCS
2008
IEEE
14 years 5 months ago
The Practice of Remote Education on Information Security
With the rapid development of computer science, its education mode also changes a lot. Teaching and learning are not restricted by the physical distance with the help of the netwo...
Wei Hu, Gang Wang, Qingsong Shi, Tianzhou Chen
IEEEARES
2007
IEEE
14 years 5 months ago
Pastures: Towards Usable Security Policy Engineering
Whether a particular computing installation meets its security goals depends on whether the administrators can create a policy that expresses these goals—security in practice re...
Sergey Bratus, Alex Ferguson, Doug McIlroy, Sean W...