Sciweavers

826 search results - page 78 / 166
» Medical Requirements for Data Protection
Sort
View
IJBIS
2010
94views more  IJBIS 2010»
14 years 7 months ago
A framework towards a multi-modal fingerprinting scheme for multimedia assets
Fingerprinting is a well known approach for identifying multimedia data without having the original data present but what amounts to its essence or "DNA". Current approa...
Atta Badii, Daniel Thiemert
AICT
2010
IEEE
240views Communications» more  AICT 2010»
14 years 1 months ago
Providing Security in 4G Systems: Unveiling the Challenges
— Several research groups are working on designing new security architectures for 4G networks such as Hokey and Y-Comm. Since designing an efficient security module requires a cl...
Mahdi Aiash, Glenford E. Mapp, Aboubaker Lasebae, ...
CBMS
2003
IEEE
15 years 3 months ago
A Clinical Report Management System Based upon the DICOM Structured Report Standard
Nowadays, several health institutions already use clinical report systems. However the majority of these systems do not comply with any standard for codification, storage and tran...
Mariana Kessler Bortoluzzi, Aldo von Wangenheim, K...
ACISP
2005
Springer
15 years 3 months ago
RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management
Abstract. RFID tags are tiny, inexpensive, inductively powered computers that are going to replace bar codes on many products, but which have many other uses as well. For example, ...
Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenb...
ECIS
2003
14 years 11 months ago
Using online services in untrusted environments: a privacy-preserving architecture
While online service providers are sometimes accused of forwarding identifying customer information as name and address to untrusted third parties, comparatively little attention ...
Claus Boyens, Oliver Günther