Sciweavers

2951 search results - page 521 / 591
» Secure Distributed DNS
Sort
View
126
Voted
COLCOM
2008
IEEE
15 years 9 months ago
Access Control Model for Sharing Composite Electronic Health Records
The adoption of electronically formatted medical records, so called Electronic Health Records (EHRs), has become extremely important in healthcare systems to enable the exchange of...
Jing Jin, Gail-Joon Ahn, Michael J. Covington, Xin...
110
Voted
DSN
2008
IEEE
15 years 9 months ago
Evaluating email's feasibility for botnet command and control
The usefulness ofemail has been tempered by its role in the widespread distribution ofspam and malicious content. Security solutions have.focused on filtering out malicious payloa...
Kapil Singh, Abhinav Srivastava, Jonathon T. Giffi...
111
Voted
ETFA
2008
IEEE
15 years 9 months ago
An adaptive network architecture for home- and building environments
Fieldbus networks have significantly improved flexibility and management in classic building automation domains. However, the costs of such installations are still greatly affec...
Rolf Kistler, Stefan Knauth, Alexander Klapproth
FOCS
2008
IEEE
15 years 9 months ago
Leakage-Resilient Cryptography
We construct a stream-cipher SC whose implementation is secure even if a bounded amount of arbitrary (adaptively, adversarially chosen) information about the internal state of SC ...
Stefan Dziembowski, Krzysztof Pietrzak
104
Voted
ICIP
2008
IEEE
15 years 9 months ago
Fairness dynamics in multimedia colluders' social networks
Multimedia social network analysis is a research area with growing importance, in which the social network members share multimedia contents with all different purposes and analyz...
Wan-Yi Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu