Sciweavers

1120 search results - page 77 / 224
» Securely sharing neuroimagery
Sort
View
CRYPTO
2001
Springer
152views Cryptology» more  CRYPTO 2001»
14 years 2 months ago
Secure Distributed Linear Algebra in a Constant Number of Rounds
Consider a network of processors among which elements in a finite field K can be verifiably shared in a constant number of rounds. Assume furthermore constant-round protocols ar...
Ronald Cramer, Ivan Damgård
WETICE
1997
IEEE
14 years 2 months ago
How Role Based Access Control is Implemented in SESAME
In this paper we want to share our experiences with implementing a scheme that enforces role based access control in a distributed, heterogeneous computing environment. This work ...
Mark Vandenwauver, René Govaerts, Joos Vand...
AGENTS
1997
Springer
14 years 2 months ago
COLLAGEN: When Agents Collaborate with People
We take the position that autonomous agents, when they interact with people, should be governed by the same principles that underlie human collaboration. These principles come fro...
Charles Rich, Candace L. Sidner
CCS
1994
ACM
14 years 2 months ago
Application Access Control at Network Level
This paper describes an access control mechanism that enforces at the network level an access control decision that is taken at the application level. The mechanism is based on th...
Refik Molva, Erich Rütsche
COMPSAC
2009
IEEE
14 years 1 months ago
Leveraging Social Contacts for Message Confidentiality in Delay Tolerant Networks
Delay and disruption tolerant networks (DTNs) can bring much-needed networking capabilities to developing countries and rural areas. DTN features such as high node mobility and in...
Karim M. El Defrawy, John Solis, Gene Tsudik