Objective: We present an integrated set of technologies, known as the Hippocratic Database, that enable healthcare enterprises to comply with privacy and security laws without imp...
: Although RFID is mainly used to identify objects whose data can then be accessed over the network, passive HF RFID tags do have significant data storage capacity (up to 4K), whic...
Abstract. Encrypting traffic does not prevent an attacker from performing some types of traffic analysis. We present a straightforward traffic analysis attack against encrypted HT...
George Dean Bissias, Marc Liberatore, David Jensen...
Mobile phones are set to become the universal interface to online services and cloud computing applications. However, using them for this purpose today is limited to two configura...
Ioana Giurgiu, Oriana Riva, Dejan Juric, Ivan Kriv...
A cost-effective approach to building up scalable Videoon-Demand (VoD) servers is to couple a number of VoD servers together in a cluster. In this article, we study a crucial vide...