Sciweavers

983 search results - page 172 / 197
» Health Care Management
Sort
View
96
Voted
SIGMOD
2010
ACM
436views Database» more  SIGMOD 2010»
14 years 9 months ago
Pluggable personal data servers
An increasing amount of personal data is automatically gathered on servers by administrations, hospitals and private companies while several security surveys highlight the failure...
Nicolas Anciaux, Luc Bouganim, Yanli Guo, Philippe...
IJNSEC
2008
127views more  IJNSEC 2008»
14 years 9 months ago
Reducing Communication Overhead for Wireless Roaming Authentication: Methods and Performance Evaluation
The protocol design for wireless roaming authentication is challenging because of the key management regarding users and home/visited networks. In this paper, we present two authe...
Men Long, Chwan-Hwa John Wu, J. David Irwin
JSAC
2006
120views more  JSAC 2006»
14 years 9 months ago
Multiple-Source Internet Tomography
Abstract-- Information about the topology and link-level characteristics of a network is critical for many applications including network diagnostics and management. However, this ...
Michael Rabbat, Mark Coates, Robert D. Nowak
IJNSEC
2007
138views more  IJNSEC 2007»
14 years 9 months ago
ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings
In 2001, Rivest et al. rstly introduced the concept of ring signatures. A ring signature is a simpli ed group signature without any manager. It protects the anonymity of a signer....
Amit K. Awasthi, Sunder Lal
TSC
2008
91views more  TSC 2008»
14 years 9 months ago
Selective Querying for Adapting Web Service Compositions Using the Value of Changed Information
Web service composition (WSC) techniques assume that the parameters used to model the environment remain static and accurate throughout the composition's execution. However, W...
John Harney, Prashant Doshi