Sciweavers

14824 search results - page 2633 / 2965
» Security - Introduction
Sort
View
HICSS
2002
IEEE
130views Biometrics» more  HICSS 2002»
15 years 8 months ago
Experiences of Using a Public Key Infrastructure to Access Patient Confidential Data over the Internet
A project to enable health care professionals (GPs, practice nurses and diabetes nurse specialists) to access, via the Internet, confidential patient data held on a secondary care...
David W. Chadwick, Carmen Carroll, S. Harvey, John...
ICDCS
2002
IEEE
15 years 8 months ago
Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments
Ubiquitous computing is poised to revolutionize the way we compute and interact with each other. However, unless privacy concerns are taken into account early in the design proces...
Jalal Al-Muhtadi, Roy H. Campbell, Apu Kapadia, M....
129
Voted
ICDCS
2002
IEEE
15 years 8 months ago
On the Performance of Group Key Agreement Protocols
Group key agreement is a fundamental building block for secure peer group communication systems. Several group key agreement protocols were proposed in the last decade, all of the...
Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, Gene...
138
Voted
IEEEMSP
2002
IEEE
125views Multimedia» more  IEEEMSP 2002»
15 years 8 months ago
Wireless multimedia error resilience via a data hiding technique
Abstract—Transmission of digital contents in unavoidable noiseprone environments demands sophisticated error detection and concealment techniques to restore the perceptual qualit...
Chun-Shien Lu
INFOCOM
2002
IEEE
15 years 8 months ago
FPAC: Fast, Fixed-Cost Authentication for Access to Reserved Resources
—Enhanced network services often involve allocating resources (bandwidth/buffer space) preferentially to packets belonging to certain flows or traffic classes. Such services ar...
Kenneth L. Calvert, Srinivasan Venkatraman, Jim Gr...
« Prev « First page 2633 / 2965 Last » Next »