نتایج جستجو برای: secure information sharing

تعداد نتایج: 1254543  

Journal: :EURASIP J. Wireless Comm. and Networking 2014
Ngoc Pham Hyung Kong

In this paper, we propose a cooperative scheme between primary and secondary networks. In this scheme, a secondary user (SU) accepts a lease of a part of the licensed band according to a cooperative request of a primary user (PU). Hence, the SU helps the PU in transmitting primary signals and has an opportunity to access the frequency spectrum. On the other hand, the SU owns important data and ...

2013
N. Asokan Alexandra Dmitrienko Marcin Nagy Elena Reshetova Ahmad-Reza Sadeghi Thomas Schneider Stanislaus Stelle

Mobile smart devices and services have become an integral part of our daily life. In this context there are many compelling scenarios for mobile device users to share resources. A popular example is tethering. However, resource sharing also raises privacy and security concerns. In this paper, we present CrowdShare, a complete framework and its (Android) implementation for secure and private res...

2013

Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that users’ data are usually processed remotely in unknown machines that users do not own or operate. While enjoying the convenience brought by this new emerging technology, users’ fears of losing control of their own data (particularly, financ...

2012
Sandra Diaz-Santiago Debrup Chakraborty

A profiling adversary is an adversary which aims to classify messages into pre-defined profiles and thus gain useful information regarding the sender or receiver of such messages. Usual chosen-plaintext secure encryption schemes are capable of securing information from profilers, but these schemes provide more security than required for this purpose. In this paper we study the requirements for ...

Journal: :Computer Communications 2008
Sheikh Iqbal Ahamed Moushumi Sharmin

0140-3664/$ see front matter 2008 Elsevier B.V. A doi:10.1016/j.comcom.2008.07.014 * Corresponding author. Tel.: +4142885222. E-mail address: [email protected] (S.I. Aham To cope with the challenges posed by device capacity and capability, and also the nature of ad hoc networks, a Service discovery model is needed that can resolve security and privacy issues with simple solutions. The use of...

1997
Sarvar Patel

Encrypted Key Exchange (EKE) [1, 2] allows two parties sharing a password to exchange authenticated information over an insecure network by using a combination of public and secret key cryptography. EKE promises security against active attacks and dictionary attacks. Other secure protocols have been proposed based on the use of randomized

2014
Tiago Oliveira Ricardo Mendes Alysson Neves Bessani

The widespread use of cloud storage in the last few years can be attributed to the existence of appealing applications such as file backup, data archival and file sharing. File sharing in particular, is implemented in different ways by distinct cloud storage services. These differences can appear at the offered permission types and in the form they are applied. We present a survey of these diff...

2014
Laura Quigley Ashley Lacombe-Duncan Sherri Adams Charlotte Moore Hepburn Eyal Cohen

BACKGROUND Children with medical complexity (CMC) are characterized by substantial family-identified service needs, chronic and severe conditions, functional limitations, and high health care use. Information exchange is critically important in high quality care of complex patients at high risk for poor care coordination. Written care plans for CMC are an excellent test case for how well inform...

Journal: :Yearbook of Medical Informatics 1993

Journal: :Emerging Infectious Diseases 1998

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید