Sciweavers

1970 search results - page 266 / 394
» Security Without Firewalls
Sort
View
HICSS
2008
IEEE
148views Biometrics» more  HICSS 2008»
15 years 10 months ago
Consumer-Centric and Privacy-Preserving Identity Management for Distributed E-Health Systems
A new framework of privacy-preserving identity management for distributed e-Health systems is proposed. Utilizing a consumer-centric approach, the healthcare consumer maintains a ...
Richard Au, Peter Croll
ICCCN
2008
IEEE
15 years 10 months ago
A New Proposal for QKD Relaying Models
—We investigate a quasi-trusted QKD relaying model. This is a three-party communication model. Two nodes Alice and Bob want to establish a secret key. However, the distance betwe...
Cuong Le Quoc, Patrick Bellot
ICNS
2008
IEEE
15 years 10 months ago
Reliable Evidence of Data Integrity from an Untrusted Storage Service
Digital storage demand is growing with the increasing use of digital artifacts from media files to business documents. Regulatory frameworks ask for unaltered, durable storage of...
Claudius Stern, Philipp Adelt, Volker Krummel, Mar...
145
Voted
SOSE
2008
IEEE
15 years 10 months ago
Ontology for Service Oriented Testing of Web Services
This paper presents a service oriented architecture for testing Web Services. In this architecture, various parties interoperate with each other to complete testing tasks through ...
Yufeng Zhang, Hong Zhu
AVSS
2007
IEEE
15 years 10 months ago
2D face pose normalisation using a 3D morphable model
The ever growing need for improved security, surveillance and identity protection, calls for the creation of evermore reliable and robust face recognition technology that is scala...
Jose Rafael Tena, Raymond S. Smith, Miroslav Hamou...