Sciweavers

579 search results - page 74 / 116
» Secure Access to Medical Data over the Internet
Sort
View
AUIC
2000
IEEE
15 years 6 months ago
Supporting Special-Purpose Health Care Models via Web Interfaces
The potential of the Web, via both the Internet and intranets, to facilitate development of clinical information systems has been evident for some time. Most Web-based clinical wo...
James R. Warren, Heath K. Frankel, Joseph T. Noone...
ICWS
2004
IEEE
15 years 3 months ago
Building Desktop Applications with Web Services in a Message-based MVC Paradigm
Over the past decade, classic client side applications with Model-View-Controller (MVC) architecture haven't changed much but become more complex. In this paper, we present a...
Xiaohong Qiu
PAIRING
2010
Springer
152views Cryptology» more  PAIRING 2010»
14 years 12 months ago
Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares
Threshold cryptography has been used to secure data and control access by sharing a private cryptographic key over different devices. This means that a minimum number of these dev...
Koen Simoens, Roel Peeters, Bart Preneel
ACSAC
2000
IEEE
15 years 6 months ago
Applications in Health Care using Public-Key Certificates and Attribute Certificates
Security infrastructures are increasingly used in the health care and welfare sector, particularly for providing security, like confidentiality, authenticity, integrity, nonrepudi...
Petra Wohlmacher, Peter Pharow
PET
2007
Springer
15 years 7 months ago
Identity Trail: Covert Surveillance Using DNS
Abstract. The Domain Name System (DNS) is the only globally deployed Internet service that provides user-friendly naming for Internet hosts. It was originally designed to return th...
Saikat Guha, Paul Francis