Sciweavers

579 search results - page 52 / 116
» Secure Access to Medical Data over the Internet
Sort
View
COMPSEC
2010
93views more  COMPSEC 2010»
15 years 4 days ago
A secure peer-to-peer backup service keeping great autonomy while under the supervision of a provider
Making backup is so cumbersome and expensive that individuals hardly ever backup their data and companies usually duplicate their data into a secondary server. This paper proposes...
Houssem Jarraya, Maryline Laurent
INFOCOM
2002
IEEE
15 years 6 months ago
Multicast Scheduling for List Requests
—Advances in wireless and optical communication, as well as in Internet multicast protocols, make broadcast and multicast methods an effective solution to disseminate data. In pa...
Vincenzo Liberatore
JAR
2008
115views more  JAR 2008»
15 years 1 months ago
Formal Models and Analysis of Secure Multicast in Wired and Wireless Networks
The spreading of multicast technology enables the development of group communication and so dealing with digital streams becomes more and more common over the Internet. Given the f...
Roberto Gorrieri, Fabio Martinelli, Marinella Petr...
KAIS
2008
99views more  KAIS 2008»
15 years 1 months ago
Privacy-preserving SVM classification
Classical data mining algorithms implicitly assume complete access to all data, either in centralized or federated form. However, privacy and security concerns often prevent sharin...
Jaideep Vaidya, Hwanjo Yu, Xiaoqian Jiang
75
Voted
PCM
2004
Springer
179views Multimedia» more  PCM 2004»
15 years 7 months ago
Digital Video Scrambling Method Using Intra Prediction Mode
Abstract. As the amount of digitalized contents increases rapidly, ‘security’ necessarily arises as one of the most important issues. The main distribution channel of digital c...
Jinhaeng Ahn, Hiuk Jae Shim, Byeungwoo Jeon, Incho...