Sciweavers

73 search results - page 15 / 15
» Practical Chosen Ciphertext Secure Encryption from Factoring
Sort
View
SOUPS
2010
ACM
13 years 5 months ago
Improving users' security choices on home wireless networks
Home networks are common but notoriously difficult to setup and maintain. The difficulty users experience in setting up and maintaining their home network is problematic because o...
Justin T. Ho, David Dearman, Khai N. Truong
HICSS
2002
IEEE
130views Biometrics» more  HICSS 2002»
13 years 10 months ago
Experiences of Using a Public Key Infrastructure to Access Patient Confidential Data over the Internet
A project to enable health care professionals (GPs, practice nurses and diabetes nurse specialists) to access, via the Internet, confidential patient data held on a secondary care...
David W. Chadwick, Carmen Carroll, S. Harvey, John...
CHIMIT
2009
ACM
13 years 11 months ago
A case study of enterprise identity management system adoption in an insurance organization
This case study describes the adoption of an enterprise identity management(IdM) system in an insurance organization. We describe the state of the organization before deploying th...
Pooya Jaferian, David Botta, Kirstie Hawkey, Konst...