Sciweavers

1906 search results - page 210 / 382
» Data Privacy
Sort
View
BEHAVIOURIT
2011
14 years 10 months ago
Identity crisis: user perspectives on multiplicity and control in federated identity management
The research presented in this paper reports on three phases of an empirical user study that examines the relationship between identity and technology using contextual interviews,...
Christine Satchell, Graeme G. Shanks, Steve Howard...
JMS
2010
139views more  JMS 2010»
15 years 2 months ago
Application of Portable CDA for Secure Clinical-document Exchange
Health Level Seven (HL7) organization published the Clinical Document Architecture (CDA) for exchanging documents among heterogeneous systems and improving medical quality based on...
Kuo-Hsuan Huang, Sung-huai Hsieh, Yuan-Jen Chang, ...
CCS
2004
ACM
15 years 9 months ago
Reusable cryptographic fuzzy extractors
We show that a number of recent definitions and constructions of fuzzy extractors are not adequate for multiple uses of the same fuzzy secret—a major shortcoming in the case of...
Xavier Boyen
135
Voted
GIL
2009
15 years 1 months ago
Wireless Sensor Network for Cattle Monitoring System
: This paper describes a cost effective Wireless Sensor Network (WSN) technology for monitoring the health of dairy cows. By monitoring and understanding the cow individual and her...
Tsung Ta Wu, Swee Keow Goo, Kae Hsiang Kwong, Crai...
IEEEARES
2009
IEEE
15 years 10 months ago
Identity-Based Hybrid Signcryption
—Signcryption is a cryptographic primitive that fulfills both the functions of digital signature and public key encryption simultaneously, at a cost significantly lower than th...
Fagen Li, Masaaki Shirase, Tsuyoshi Takagi