Sciweavers

2454 search results - page 208 / 491
» Privacy in the Information and Communications Technologies
Sort
View
IJIEM
2010
171views more  IJIEM 2010»
15 years 6 days ago
eConsent: provenance, use and future role
The use of information technology to manage patient consent is an important emerging area of research in health data management. This paper identifies literature, technological ad...
Sophie Cockcroft
MINENET
2006
ACM
15 years 7 months ago
SC2D: an alternative to trace anonymization
Progress in networking research depends crucially on applying novel analysis tools to real-world traces of network activity. This often conflicts with privacy and security requir...
Jeffrey C. Mogul, Martin F. Arlitt
CCS
2011
ACM
14 years 1 months ago
Practical PIR for electronic commerce
We extend Goldberg’s multi-server information-theoretic private information retrieval (PIR) with a suite of protocols for privacypreserving e-commerce. Our first protocol adds ...
Ryan Henry, Femi G. Olumofin, Ian Goldberg
WICON
2008
15 years 3 months ago
Security vulnerabilities in IEEE 802.22
Cognitive Radio (CR) is seen as one of the enabling technologies for realizing a new spectrum access paradigm, viz. Opportunistic Spectrum Sharing (OSS). IEEE 802.22 is the world&...
Kaigui Bian, Jung Min Park
106
Voted
ITCC
2003
IEEE
15 years 7 months ago
ACE: A Resource-Aware Adaptive Compression Environment
We present an adaptive compression environment (ACE) that uses both underlying resource performance (network and CPU) predictions and the compressibility of the data stream to per...
Sezgin Sucu, Chandra Krintz