Sciweavers

826 search results - page 111 / 166
» Medical Requirements for Data Protection
Sort
View
116
Voted
ACNS
2010
Springer
172views Cryptology» more  ACNS 2010»
15 years 4 months ago
Secure Sketch for Multiple Secrets
Secure sketches are useful in extending cryptographic schemes to biometric data since they allow recovery of fuzzy secrets under inevitable noise. In practice, secrets derived from...
Chengfang Fang, Qiming Li, Ee-Chien Chang
114
Voted
DBSEC
2009
110views Database» more  DBSEC 2009»
15 years 1 months ago
Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients
Existing approaches for protecting sensitive information stored (outsourced) at external "honest-but-curious" servers are typically based on an overlying layer of encrypt...
Valentina Ciriani, Sabrina De Capitani di Vimercat...
93
Voted
CN
2006
115views more  CN 2006»
15 years 20 days ago
MuSeQoR: Multi-path failure-tolerant security-aware QoS routing in Ad hoc wireless networks
In this paper, we present MuSeQoR: a new multi-path routing protocol that tackles the twin issues of reliability (protection against failures of multiple paths) and security, whil...
Tamma Bheemarjuna Reddy, S. Sriram, B. S. Manoj, C...
102
Voted
ECCV
2004
Springer
15 years 6 months ago
CT from an Unmodified Standard Fluoroscopy Machine Using a Non-reproducible Path
3D reconstruction from image data is required in many medical procedures. Recently, the use of fluoroscopy data to generate these 3D models has been explored. Most existing methods...
Chris Baker, Christian Debrunner, Mohamed Mahfouz,...
181
Voted
SIGMOD
2007
ACM
195views Database» more  SIGMOD 2007»
16 years 23 days ago
Effective variation management for pseudo periodical streams
Many database applications require the analysis and processing of data streams. In such systems, huge amounts of data arrive rapidly and their values change over time. The variati...
Lv-an Tang, Bin Cui, Hongyan Li, Gaoshan Miao, Don...