Sciweavers

654 search results - page 76 / 131
» Privacy protection for RFID data
Sort
View
92
Voted
JIB
2007
88views more  JIB 2007»
15 years 13 days ago
Achieving k-anonymity in DataMarts used for gene expressions exploitation
Gene expression profiling is a sophisticated method to discover differences in activation patterns of genes between different patient collectives. By reasonably defining patient...
Konrad Stark, Johann Eder, Kurt Zatloukal
80
Voted
CHI
2002
ACM
16 years 27 days ago
The context fabric: an infrastructure for context-aware computing
Despite many sensor, hardware, networking, and software advances, it is still quite difficult to build effective and reliable context-aware applications. We propose to build a con...
Jason I. Hong
91
Voted
IJWMC
2006
112views more  IJWMC 2006»
15 years 16 days ago
Security mechanisms, attacks and security enhancements for the IEEE 802.11 WLANs
: Wired Equivalent Privacy (WEP) protocol was adopted to protect authorised users from unauthorised access and eavesdropping in the IEEE 802.11 wireless LANs. It has been proven th...
Yang Xiao, Chaitanya Bandela, Xiaojiang Du, Yi Pan...
104
Voted
ICWS
2009
IEEE
14 years 10 months ago
DIALOG: Distributed Auditing Logs
Service-oriented systems facilitate business workflows to span multiple organizations (e.g. by means of Web services). As a side effect, data may be more easily transferred over o...
Christoph Ringelstein, Steffen Staab
119
Voted
TRUST
2009
Springer
15 years 7 months ago
Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture
During many crises, access to sensitive emergency-support information is required to save lives and property. For example, for effective evacuations first responders need the name...
Timothy E. Levin, Jeffrey S. Dwoskin, Ganesha Bhas...