Sciweavers

2454 search results - page 62 / 491
» Privacy in the Information and Communications Technologies
Sort
View
ESORICS
2007
Springer
15 years 4 months ago
Fragmentation and Encryption to Enforce Privacy in Data Storage
Abstract. Privacy requirements have an increasing impact on the realization of modern applications. Technical considerations and many significant commercial and legal regulations ...
Valentina Ciriani, Sabrina De Capitani di Vimercat...
86
Voted
PERCOM
2005
ACM
15 years 9 months ago
A Scalable and Provably Secure Hash-Based RFID Protocol
The biggest challenge for RFID technology is to provide benefits without threatening the privacy of consumers. Many solutions have been suggested but almost as many ways have been...
Gildas Avoine, Philippe Oechslin
AGENTS
2000
Springer
15 years 2 months ago
Experimental assessment of the effectiveness of synthetic personae for multi-modal e-retail applications
This paper details results of an experiment to empirically evaluate the effectiveness and user acceptability of human-like synthetic agents in a multi-modal electronic retail scen...
Helen McBreen, Paul Shade, Mervyn A. Jack, Peter J...
ACSAC
2001
IEEE
15 years 1 months ago
Trustworthiness in Distributed Electronic Healthcare Records-Basis for Shared Care
Shared Care is the common answer to the challenge for improving health system's quality and efficiency. This development must be accompanied by implementing shared care infor...
Bernd Blobel
IEEECIT
2010
IEEE
14 years 8 months ago
Research on Key Technologies of Building Home Control Based on the Wireless Network
: Relatively higher cost, worse extensibility of the monitoring points and weaker mobility are those disadvantages that widely exist in the wire data collection system of the tradi...
Si-You Xiao, Xuan Zhang