Sciweavers

826 search results - page 23 / 166
» Medical Requirements for Data Protection
Sort
View
INFOCOM
2012
IEEE
13 years 2 days ago
L2P2: Location-aware location privacy protection for location-based services
Abstract—Location privacy has been a serious concern for mobile users who use location-based services provided by the thirdparty provider via mobile networks. Recently, there hav...
Yu Wang 0003, Dingbang Xu, Xiao He, Chao Zhang, Fa...
SIGSOFT
2003
ACM
15 years 10 months ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz
ISMAR
2005
IEEE
15 years 3 months ago
Spatial Measurements for Medical Augmented Reality
This paper presents a set of Augmented Reality (AR) based interaction techniques for spatial analysis of medical datasets. Computer-aided medical planning tools such as our Virtua...
Bernhard Reitinger, Pascal Werlberger, Alexander B...
FC
2005
Springer
157views Cryptology» more  FC 2005»
15 years 3 months ago
Securing Sensitive Data with the Ingrian DataSecure Platform
Recent high profile data thefts have shown that perimeter defenses are not sufficient to secure important customer data. The damage caused by these thefts can be disastrous, and to...
Andrew Koyfman
AHS
2006
IEEE
109views Hardware» more  AHS 2006»
15 years 3 months ago
VLSI Design IP Protection: Solutions, New Challenges, and Opportunities
It has been a decade since the need of VLSI design intellectual property (IP) protection was identified [1,2]. The goals of IP protection are 1) to enable IP providers to protect ...
Lin Yuan, Gang Qu, Lahouari Ghouti, Ahmed Bouridan...