Sciweavers

3349 search results - page 211 / 670
» Data Security
Sort
View
ICISC
1998
132views Cryptology» more  ICISC 1998»
15 years 5 months ago
The flood-gate principle - a hybrid approach to a high security solution
The classical role of a firewall consists in protecting a computer network against attacks from the outside world, especially the Internet. Firewalls are often expensive, hard to c...
Ernst Georg Haffner, Thomas Engel, Christoph Meine...
111
Voted
WWW
2004
ACM
16 years 4 months ago
Integrating elliptic curve cryptography into the web's security infrastructure
RSA is the most popular public-key cryptosystem on the Web today but long-term trends such as the proliferation of smaller, simpler devices and increasing security needs will make...
Vipul Gupta, Douglas Stebila, Sheueling Chang Shan...
156
Voted
TMM
2002
133views more  TMM 2002»
15 years 3 months ago
A model for secure multimedia document database system in a distributed environment
Abstract--The Internet provides a universal platform for largescale distribution of information and supports inter-organizational services, system integration, and collaboration. U...
James B. D. Joshi, Zhaohui Kevin Li, Husni Fahmi, ...
PCM
2001
Springer
130views Multimedia» more  PCM 2001»
15 years 8 months ago
Data Encryption Using MRF with an RSA Key
In a digital multimedia era, the security of multimedia over network transmission becomes a challenging issue. A strategy, combining cryptography with steganography, is investigat...
Chaur-Chin Chen
MOCOMED
2003
15 years 5 months ago
PDA-based decision support and documentation for transplantation surgery data
: The Transplantation Unit of the Technical University of Munich has developed a mobile, handheld based application for preoperative transplantation patient management. It provides...
Andreas Krause, Alexander T. Mehlhorn, Dominik Har...