Sciweavers

826 search results - page 121 / 166
» Medical Requirements for Data Protection
Sort
View
DICTA
2007
14 years 11 months ago
Biometric Based Cryptographic Key Generation from Faces
Existing asymmetric encryption algorithms require the storage of the secret private key. Stored keys are often protected by poorly selected user passwords that can either be guess...
B. Chen, V. Chandran
AISM
2004
14 years 11 months ago
Understanding Challenges of Information Security Culture: A Methodological Issue
Although, many organisations have implemented technical solutions to protect information resources from adverse events, internal security breaches continue to occur. Therefore an ...
Omar Zakaria
CN
2007
77views more  CN 2007»
14 years 9 months ago
Secure many-to-one symbol transmission for implementation on smart cards
Multicast communication is arguably the most promising paradigm to enable mass Internet transmission of live events, or any other content sent on the network from a single source ...
Francesc Sebé, Alexandre Viejo, Josep Domin...
JPDC
2007
84views more  JPDC 2007»
14 years 9 months ago
Performance of memory reclamation for lockless synchronization
Achieving high performance for concurrent applications on modern multiprocessors remains challenging. Many programmers avoid locking to improve performance, while others replace l...
Thomas E. Hart, Paul E. McKenney, Angela Demke Bro...
ICMCS
2009
IEEE
152views Multimedia» more  ICMCS 2009»
14 years 7 months ago
Error correction scheme for uncompressed HD video over wireless
Digital transmission of uncompressed high-definition video is challenging because of its high data rate and its extreme sensitivity to bit errors. In this paper we propose a simpl...
Megha Manohara, Raghuraman Mudumbai, Jerry Gibson,...