Sciweavers

4264 search results - page 57 / 853
» Provenance-aware secure networks
Sort
View
JMS
2010
139views more  JMS 2010»
14 years 8 months ago
Application of Portable CDA for Secure Clinical-document Exchange
Health Level Seven (HL7) organization published the Clinical Document Architecture (CDA) for exchanging documents among heterogeneous systems and improving medical quality based on...
Kuo-Hsuan Huang, Sung-huai Hsieh, Yuan-Jen Chang, ...
COMSIS
2006
100views more  COMSIS 2006»
14 years 9 months ago
Holistic Approach to Wep Protocol in Securing Wireless Network Infrastructure
Constant increase in use of wireless infrastructure networks for business purposes created a need for strong safety mechanisms. This paper describes WEP (Wired Equivalent Privacy) ...
Radomir Prodanovic, Dejan Simic
AINA
2007
IEEE
15 years 4 months ago
Privacy-Preserving Two-Party K-Means Clustering via Secure Approximation
Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Taka...
NDSS
2003
IEEE
15 years 3 months ago
SiRiUS: Securing Remote Untrusted Storage
Eu-Jin Goh, Hovav Shacham, Nagendra Modadugu, Dan ...