Sciweavers

1120 search results - page 50 / 224
» Securely sharing neuroimagery
Sort
View
129
Voted
JSW
2008
240views more  JSW 2008»
15 years 15 days ago
A Secure e-Health Architecture based on the Appliance of Pseudonymization
Due to the cost pressure on the health care system an increase in the need for electronic healthcare records (EHR) could be observed in the last decade, because EHRs promise massiv...
Bernhard Riedl, Veronika Grascher, Thomas Neubauer
83
Voted
JSAC
2006
127views more  JSAC 2006»
15 years 15 days ago
Location-based compromise-tolerant security mechanisms for wireless sensor networks
Abstract-- Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose ...
Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang
JMS
2010
139views more  JMS 2010»
14 years 11 months ago
Application of Portable CDA for Secure Clinical-document Exchange
Health Level Seven (HL7) organization published the Clinical Document Architecture (CDA) for exchanging documents among heterogeneous systems and improving medical quality based on...
Kuo-Hsuan Huang, Sung-huai Hsieh, Yuan-Jen Chang, ...
114
Voted
TIT
2011
128views more  TIT 2011»
14 years 7 months ago
Secure Network Coding on a Wiretap Network
—In the paradigm of network coding, the nodes in a network are allowed to encode the information received from the input links. With network coding, the full capacity of the netw...
Ning Cai, Raymond W. Yeung
117
Voted
EUROMICRO
2009
IEEE
15 years 4 months ago
Secure Service-Oriented Grid Computing with Public Virtual Worker Nodes
Cloud computing uses virtualization technologies to offer a non-shared use rental of computer resources with publicly accessible worker nodes. However, unlike Grid computing, Cloud...
Matthias Schmidt, Niels Fallenbeck, Matthew Smith,...