Sciweavers

1120 search results - page 11 / 224
» Securely sharing neuroimagery
Sort
View
ACSAC
2009
IEEE
14 years 3 months ago
Secure Web 2.0 Content Sharing Beyond Walled Gardens
San-Tsai Sun, Kirstie Hawkey, Konstantin Beznosov
CCS
2010
ACM
14 years 3 months ago
Attribute based data sharing with attribute revocation
Shucheng Yu, Cong Wang, Kui Ren, Wenjing Lou
ISI
2008
Springer
13 years 8 months ago
Information sharing and privacy protection of terrorist or criminal social networks
Terrorist or criminal social network analysis is helpful for intelligence and law enforcement force in investigation. However, individual agency usually has part of the complete te...
Christopher C. Yang
ICITS
2009
13 years 6 months ago
Linear Threshold Multisecret Sharing Schemes
In a multisecret sharing scheme, several secret values are distributed among a set of n users, and each secret may have a different associated access structure. We consider here un...
Oriol Farràs, Ignacio Gracia, Sebasti&agrav...
VISSYM
2007
13 years 11 months ago
TrustNeighborhoods: Visualizing Trust in Distributed File Sharing Systems
We present TrustNeighborhoods, a security trust visualization for situational awareness on the Internet aimed at novice and intermediate users of a distributed file sharing system...
Niklas Elmqvist, Philippas Tsigas