Sciweavers

14824 search results - page 2755 / 2965
» Security - Introduction
Sort
View
JNW
2008
116views more  JNW 2008»
14 years 10 months ago
Scalable Revocation in Hybrid Ad Hoc Networks: The SHARL Scheme
The article proposes a simple, scalable and robust scheme for the distribution of revocation information in mobile ad hoc networks (MANETs). The scheme is intended for ad hoc netwo...
Mona Holsve Ofigsbø, Anne Marie Hegland, P&...
KES
2008
Springer
14 years 10 months ago
Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Data Base
Privacy is one of the most important properties of an information system must satisfy. In which systems the need to share information among different, not trusted entities, the pro...
Mahmoud Hussein, Ashraf El-Sisi, Nabil A. Ismail
IJIEM
2010
171views more  IJIEM 2010»
14 years 10 months ago
eConsent: provenance, use and future role
The use of information technology to manage patient consent is an important emerging area of research in health data management. This paper identifies literature, technological ad...
Sophie Cockcroft
MANSCI
2008
106views more  MANSCI 2008»
14 years 10 months ago
Can They Take It With Them? The Portability of Star Knowledge Workers' Performance
This paper examines the portability of star security analysts' performance. Star analysts who switched employers experienced an immediate decline in performance that persiste...
Boris Groysberg, Linda-Eling Lee, Ashish Nanda
IJSNET
2010
122views more  IJSNET 2010»
14 years 10 months ago
Ensuring high sensor data quality through use of online outlier detection techniques
: Data collected by Wireless Sensor Networks (WSNs) are inherently unreliable. Therefore, to ensure high data quality, secure monitoring, and reliable detection of interesting and ...
Yang Zhang, Nirvana Meratnia, Paul J. M. Havinga
« Prev « First page 2755 / 2965 Last » Next »