Sciweavers

416 search results - page 39 / 84
» UbiData: Requirements and Architecture for Ubiquitous Data A...
Sort
View
ICICS
2005
Springer
15 years 3 months ago
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware
Software that covertly monitors a user’s actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and remov...
Debra L. Cook, Ricardo A. Baratto, Angelos D. Kero...
HPCS
2006
IEEE
15 years 3 months ago
Collaborative Agents for Data Dissemination in Wireless Sensor Networks
This paper presents collaborative agents system architecture approach for data dissemination in a wireless sensor network (WSN). This system architecture consists of four layers o...
Sajid Hussain, Elhadi Shakshuki, Abdul Wasey Matin...
IHI
2010
160views Healthcare» more  IHI 2010»
14 years 4 months ago
Securing the e-health cloud
Modern information technology is increasingly used in healthcare with the goal to improve and enhance medical services and to reduce costs. In this context, the outsourcing of com...
Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy
86
Voted
PDPTA
1996
14 years 11 months ago
Performance of a Multiprocessor Multidisk CD-ROM Image Server
Professionals in various elds such as medical imaging, biology, and civil engineering require rapid access to huge amounts of image data. Multimedia interfaces further increase t...
Rolf Muralt, Benoit A. Gennart, Bernard Krummenach...
76
Voted
INFOCOM
2008
IEEE
15 years 4 months ago
A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
—Anonymity has received increasing attention in the literature due to the users’ awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network s...
Jinyuan Sun, Chi Zhang, Yuguang Fang