Sciweavers

579 search results - page 28 / 116
» Secure Access to Medical Data over the Internet
Sort
View
EDBT
2008
ACM
161views Database» more  EDBT 2008»
16 years 1 months ago
The TELAR mobile mashup platform for Nokia internet tablets
With the Web 2.0 trend and its participation of end-users more and more data and information services are online accessible, such as web sites, Wikis, or web services. The integra...
Andreas Brodt, Daniela Nicklas
SRDS
2003
IEEE
15 years 6 months ago
Pesto Flavoured Security
We demonstrate that symmetric-key cryptography can be used for both read and write access control. One-time write access can be granted by handing over an encryption key, and our ...
Feike W. Dillema, Tage Stabell-Kulø
MOBIMEDIA
2007
15 years 2 months ago
Experimental evaluation of community-based WLAN voice and data services
The purpose of this work is to experimentally evaluate the quality of voice and data services over community-based WLAN access networks. We use P2PWNC, the Wireless LAN roaming ar...
Pantelis A. Frangoudis, Vasileios P. Kemerlis, Dim...
CSREASAM
2003
15 years 2 months ago
Randomized Traitor Tracing Algorithms for Broadcast Security
We introduce and analyze a randomized traitor tracing algorithm for broadcast security. This algorithm is very efficient compared to brute force methods (the mean time it takes is...
Simon McNicol, Serdar Boztas
INFOCOM
2009
IEEE
15 years 8 months ago
Building Covert Channels over the Packet Reordering Phenomenon
Abstract—New modes of communication have shown themselves to be needed for more secure and private types of data. Steganography or data-hiding through covert channels can be high...
Adel El-Atawy, Ehab Al-Shaer