Sciweavers

826 search results - page 77 / 166
» Medical Requirements for Data Protection
Sort
View
GRC
2007
IEEE
15 years 4 months ago
Secure Similarity Search
— One of the most substantial ways to protect users’ sensitive information is encryption. This paper is about the keyword index search system on encrypted documents. It has bee...
Hyun-A Park, Bum Han Kim, Dong Hoon Lee, Yon Dohn ...
IJNSEC
2008
110views more  IJNSEC 2008»
14 years 9 months ago
Security Measures and Weaknesses of the GPRS Security Architecture
This paper presents an evaluation of the security architecture employed in the General Packet Radio Services (GPRS). More specifically, the security measures applied to protect th...
Christos Xenakis
HIJ
2008
82views more  HIJ 2008»
14 years 10 months ago
Supporting grid-based clinical trials in Scotland
As clinical trials and medical population studies grow in size and complexity, a computational infrastructure that can underpin such studies is highly desirable. This should addre...
Richard O. Sinnott, A. J. Stell, Oluwafemi Ajayi
CCS
2003
ACM
15 years 3 months ago
Receiver anonymity via incomparable public keys
We describe a new method for protecting the anonymity of message receivers in an untrusted network. Surprisingly, existing methods fail to provide the required level of anonymity ...
Brent R. Waters, Edward W. Felten, Amit Sahai
PAKDD
2004
ACM
121views Data Mining» more  PAKDD 2004»
15 years 3 months ago
Secure Association Rule Sharing
Abstract. The sharing of association rules is often beneficial in industry, but requires privacy safeguards. One may decide to disclose only part of the knowledge and conceal stra...
Stanley R. M. Oliveira, Osmar R. Zaïane, Y&uu...