Sciweavers

826 search results - page 121 / 166
» Medical Requirements for Data Protection
Sort
View
127
Voted
DICTA
2007
15 years 2 months ago
Biometric Based Cryptographic Key Generation from Faces
Existing asymmetric encryption algorithms require the storage of the secret private key. Stored keys are often protected by poorly selected user passwords that can either be guess...
B. Chen, V. Chandran
118
Voted
AISM
2004
15 years 2 months ago
Understanding Challenges of Information Security Culture: A Methodological Issue
Although, many organisations have implemented technical solutions to protect information resources from adverse events, internal security breaches continue to occur. Therefore an ...
Omar Zakaria
106
Voted
CN
2007
77views more  CN 2007»
15 years 18 days ago
Secure many-to-one symbol transmission for implementation on smart cards
Multicast communication is arguably the most promising paradigm to enable mass Internet transmission of live events, or any other content sent on the network from a single source ...
Francesc Sebé, Alexandre Viejo, Josep Domin...
106
Voted
JPDC
2007
84views more  JPDC 2007»
15 years 15 days ago
Performance of memory reclamation for lockless synchronization
Achieving high performance for concurrent applications on modern multiprocessors remains challenging. Many programmers avoid locking to improve performance, while others replace l...
Thomas E. Hart, Paul E. McKenney, Angela Demke Bro...
85
Voted
ICMCS
2009
IEEE
152views Multimedia» more  ICMCS 2009»
14 years 10 months ago
Error correction scheme for uncompressed HD video over wireless
Digital transmission of uncompressed high-definition video is challenging because of its high data rate and its extreme sensitivity to bit errors. In this paper we propose a simpl...
Megha Manohara, Raghuraman Mudumbai, Jerry Gibson,...