Sciweavers

331 search results - page 3 / 67
» Structuring Protocol Implementations to Protect Sensitive Da...
Sort
View
JAMIA
2011
68views more  JAMIA 2011»
12 years 8 months ago
A secure protocol for protecting the identity of providers when disclosing data for disease surveillance
Background Providers have been reluctant to disclose patient data for public-health purposes. Even if patient privacy is ensured, the desire to protect provider confidentiality h...
Khaled El Emam, Jun Hu, Jay Mercer, Liam Peyton, M...
MMSEC
2006
ACM
102views Multimedia» more  MMSEC 2006»
13 years 11 months ago
Zero-knowledge watermark detector robust to sensitivity attacks
Current zero-knowledge watermark detectors are based on a linear correlation between the asset features and a given secret sequence. This detection function is susceptible of bein...
Juan Ramón Troncoso-Pastoriza, Fernando P&e...
WDAG
2009
Springer
130views Algorithms» more  WDAG 2009»
13 years 12 months ago
Contention-Sensitive Data Structures and Algorithms
A contention-sensitive data structure is a concurrent data structure in which the overhead introduced by locking is eliminated in the common cases, when there is no contention, or ...
Gadi Taubenfeld
WFLP
2009
Springer
277views Algorithms» more  WFLP 2009»
13 years 12 months ago
Termination of Context-Sensitive Rewriting with Built-In Numbers and Collection Data Structures
Context-sensitive rewriting is a restriction of rewriting that can be used to elegantly model declarative specification and programming languages such as Maude. Furthermore, it ca...
Stephan Falke, Deepak Kapur
CASCON
2006
149views Education» more  CASCON 2006»
13 years 6 months ago
Packet decoding using context sensitive parsing
Protocol tester is a project at RMC and Queen's that applies program transformation techniques to protocol data to evaluate the security of network applications. As part of t...
Sylvain Marquis, Thomas R. Dean, Scott Knight