Sciweavers

1120 search results - page 51 / 224
» Securely sharing neuroimagery
Sort
View
122
Voted
DIM
2005
ACM
15 years 2 months ago
Usable presentation of secure pseudonyms
Privacy-Enhancing Identity Management (PIM) enables users to control which personal information they provide to their communication partner(s) by partitioning their personal infor...
Katrin Borcea-Pfitzmann, Elke Franz, Andreas Pfitz...
86
Voted
ADHOC
2007
104views more  ADHOC 2007»
15 years 21 days ago
An overlay approach to data security in ad-hoc networks
While it has been argued that application-layer overlay protocols can enhance services in mobile ad-hoc networks, hardly any empirical data is available on the throughput and dela...
Jörg Liebeherr, Guangyu Dong
140
Voted
IJNSEC
2008
140views more  IJNSEC 2008»
15 years 17 days ago
A Secure Group Key Management Scheme for Wireless Cellular Systems
In wireless networks, secure multicast protocols are more difficult to implement efficiently due to the dynamic nature of the multicast group and the scarcity of bandwidth at the ...
Hwa Young Um, Edward J. Delp
99
Voted
IANDC
2007
94views more  IANDC 2007»
15 years 15 days ago
Mediating secure information flow policies
In this paper we study secure information flow policies in the sense of Meadows [12] and others for aggregated datasets, collectively. We first present a method for combining di...
Guo-Qiang Zhang
120
Voted
KSEM
2010
Springer
14 years 10 months ago
A SOM-Based Technique for a User-Centric Content Extraction and Classification of Web 2.0 with a Special Consideration of Securi
Web 2.0 is much more than adding a nice facade to old web applications rather it is a new way of thinking about software architecture of Rich Internet Applications (RIA). In compar...
Amirreza Tahamtan, Amin Anjomshoaa, Edgar Weippl, ...