Sciweavers

3452 search results - page 539 / 691
» Secure Data Outsourcing
Sort
View
103
Voted
IFIP
2009
Springer
15 years 7 months ago
Detecting Spam at the Network Level
Spam is increasingly a core problem affecting network security and performance. Indeed, it has been estimated that 80% of all email messages are spam. Content-based filters are a ...
Anna Sperotto, Gert Vliek, Ramin Sadre, Aiko Pras
102
Voted
IFIP
2009
Springer
15 years 7 months ago
Enhancing Progressive Encryption for Scalable Video Streams
The technique called progressive encryption is used in many areas of content security. However, the plain algorithm itself is only applicable in real transmission scenarios where n...
Viktor Gergely, Gábor Fehér
100
Voted
BROADCOM
2008
IEEE
15 years 7 months ago
A Roadmap to Proliferate Open Source Software Usage within SA Government Servers
Open Source software (OSS) is increasingly being recognized by the government sector around the world as a viable choice to proprietary software, particularly in a number of areas...
Jabu Mtsweni, Elmarie Biermann
136
Voted
HICSS
2008
IEEE
148views Biometrics» more  HICSS 2008»
15 years 7 months ago
Consumer-Centric and Privacy-Preserving Identity Management for Distributed E-Health Systems
A new framework of privacy-preserving identity management for distributed e-Health systems is proposed. Utilizing a consumer-centric approach, the healthcare consumer maintains a ...
Richard Au, Peter Croll
103
Voted
ICCCN
2008
IEEE
15 years 7 months ago
Massively Parallel Anomaly Detection in Online Network Measurement
—Detecting anomalies during the operation of a network is an important aspect of network management and security. Recent development of high-performance embedded processing syste...
Shashank Shanbhag, Tilman Wolf