Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "Confidentiality"

Research of Web Service Security Model Based on SOAP Information

Author(s): Shujun Pei | Deyun Chen | Yuyuan Chu | Qingfeng Xu | Shi Xi
An Access Control Framework for Grid Environment

Author(s): Seema | Sarbjeet Singh | Dolly Sharma
Securing Bandwidth Request Messages in Wimax

Author(s): Kaushik Adhikary | Rajinder Kumar | Amit Kumar
A Block Cipher Using Graph Structures and Logical XOR Operation

Author(s): CH. Suneetha | D. Sravan Kumar | A.Chandra sekhar
Stream Data Mining and Anomaly Detection

Author(s): Mohammadjafar Esmaeili | Arwa Almadan
Intrusion Detection System for Ad hoc Mobile Networks

Author(s): Muhammad Nawaz Khan | Muhammad Ilyas Khatak | Muhammad Faisal
Personal health care of internal medicine residents

Author(s): Venkataraman Palabindala | Paul Foster | Swetha Kanduri | Avanthi Doppalapudi | Amaleswari Pamarthy | Karthik Kovvuru
Analysis and Design of Affine and Hill Cipher

Author(s): Mozhgan Mokhtari | Hassan Naraghi
Design of Digital Signature Algorithm by Fractals and Chaos Theory

Author(s): Dr. G. Geetha | K. Thamizhchelvy
A study of intimate partner violence among females attending a Teaching Hospital out-patient department

Author(s): KALA Kuruppuarachchi | LT Wijeratne | GDSSK Weerasinghe | MUPK Peris | SS Williams
Review Of Syn-Flooding Attack Detection Mechanism

Author(s): Mehdi Ebady Manna | Angela Amphawan
Performance Evaluation of Wi-Fi comparison with WiMAX Networks

Author(s): M.Sreerama Murty | D.Veeraiah | A.Srinivas Rao
Protected Data Objects Replication in Data Grid

Author(s): G. Aruna Kranthi | D. Shashi Rekha
Applying a Model of Patient's Right in the State Hospital, Sari, Iran

Author(s): Ghasem Abedi | Layla Azimehr | Farideh Rostami | Samira Mohammadi
Model-Based Security Testing

Author(s): Ina Schieferdecker | Juergen Grossmann | Martin Schneider
A Distributed Secure Mechanism for Resource Protection in a Digital Ecosystem Environment

Author(s): Rukshan Athauda | Geoff Skinner | Ilung Pranata
Segment Based Visual Cryptography For Key Distribution

Author(s): Sesha Pallavi Indrakanti | Avadhani P S
Split Personality Malware: A Security Threat

Author(s): Nisha Lalwani | M.B.Chandak | R.V.Dharaskar
Data Integrity and Confidentiality in Outsourced Database

Author(s): Sonal Balpande | Rajashree Shegde | Lata Ragha
Survey of MAC Layer Protocols for vehicular Ad Hoc Network

Author(s): Vimal Bibhu | Dhirendra Kumar Singh
Achieving Identity-Based Cryptography in a Personal Digital Assistant Device

Author(s): L. Martínez-Ramos | L. López-García | F. Rodríguez-Henríquez

Author(s): Liji Merlin Kurian | Saiju Punnoose
A Novel Approach for Cheating Prevention through Visual Cryptographic Analysis

Author(s): Morampudi Naresh kumar | Datrika Srinivas Rao | D.Sravanthi
Implimentation of Cryptographic Algorithm for GSM and UMTS Systems.

Author(s): Alpesh R. Sankaliya | V.Mishra | Abhilash Mandloi
A Secured Chat System With Authentication Technique As RSA Digital Signature

Author(s): Oyinloye O.Elohor | Ogemuno Emamuzo | Akinbohun Folake | Ayodeji .I. Fasiku
Generic Model to Send Secure Alerts for Utility Companies

Author(s): Galván–Bobadilla I. | Santos–Domínguez M. | Perez–Díaz J.A.
Cognitive Impairment and Dangerous Driving: A Decision Making Model for the Psychologist to Balance Confidentiality with Safety

Author(s): hristopher M. Love | Jennifer Costillo | Robert K. Welsh | Robert K. Welsh | David Brokaw
Hiding Sensitive XML Association Rules With Supervised Learning Technique

Author(s): Khalid Iqbal | Dr. Sohail Asghar | Dr. Abdulrehman Mirza
Barriers to antiretroviral therapy adherence in rural Mozambique

Author(s): Groh Kate | Audet Carolyn | Baptista Alberto | Sidat Mohsin | Vergara Alfredo | Vermund Sten | Moon Troy
Digital Video Encryption Algorithms Based on Correlation-Preserving Permutations

Author(s): Socek Daniel | Magliveras Spyros | Ćulibrk Dubravko | Marques Oge | Kalva Hari | Furht Borko
Benefits and problems of electronic information exchange as perceived by health care professionals: an interview study

Author(s): Zwaanswijk Marieke | Verheij Robert | Wiesman Floris | Friele Roland
Emergency department triage: an ethical analysis

Author(s): Aacharya Ramesh | Gastmans Chris | Denier Yvonne
Securing Embedded Smart Cameras with Trusted Computing

Author(s): Winkler Thomas | Rinner Bernhard
Young people's views on the potential use of telemedicine consultations for sexual health: results of a national survey

Author(s): Garrett Cameryn | Hocking Jane | Chen Marcus | Fairley Christopher | Kirkman Maggie
A Feedback-Based Transmission for Wireless Networks with Energy and Secrecy Constraints

Author(s): Krikidis Ioannis | Thompson JohnS | McLaughlin Steve | Grant PeterM
Network Coding Based Security for Routing Attacks in WRN: Frechet Interference and Rayleigh Outage Evaluation

Author(s): R. Villalpando-Hernández | C. Vargas-Rosales | D. Muñoz-Rodríguez | J. R. Rodríguez
Improving the Diffusion power of AES Rijndael with key multiplication

Author(s): Mohan H.S. | A. Raji Reddy | Manjunath T.N
A Survey on Security in Medical Image Communication

Author(s): A. Umamageswari | M. Ferni Ukrit | Dr.G. R. Suresh
Network Intrusion Detection using Clustering: A Data Mining Approach

Author(s): S.Sathya Bama | M.S.Irfan Ahmed | A. Saravanan
Enhancing Confidentiality of Private Communication through Dual Compression

Author(s): Kristipati Sudharshana Reddy | Munwar Sk | Rajesh Bhakthavatsalam
Ethical and Legal Dilemmas in Radiology

Author(s): Ma. Ashrafi | Mo. Ashrafi | L. Mirzaei
Confidentiality in gamete donation

Author(s): Neda Yavari | Elaheh Motevasseli
Ensuring the security and privacy of information in mobile health-care communication systems

Author(s): Ademola O. Adesina | Kehinde K. Agbele | Ronald Februarie | Ademola P. Abidoye | Henry O. Nyongesa
Security Guidelines for the Development of Accessible Web Applications through the implementation of intelligent systems

Author(s): Edward Rolando Núñez Valdez | Oscar Sanjuán Martínez | Gloria García Fernández | Luis Joyanes Aguilar | Juan Manuel Cueva Lovelle
Securing the Distributions in P2P Networks with Trusted Platform Modules

Author(s): Hao Li | Yu Qin | Qianying Zhang | Shijun Zhao
Sensitive Data Protection Based on Intrusion Tolerance in Cloud Computing

Author(s): Jingyu Wang | xuefeng Zheng | Dengliang Luo

Author(s): Shaik Rasool | G. Sridhar | K. Hemanth Kumar | P. Ravi Kumar

Author(s): Wasinee Noonpakdee | Jiang Liu | Shigeru Shimamoto
Process to Obtain Quick Counts from PREP

Author(s): Martínez–Cruz M.Á. | Balankin A. | Patiño-Ortiz M.
Pharmacy Ethics: Evaluation Pharmacists’ Ethical Attitude

Author(s): Pooneh Salari Sharif | Mohammadreza Javadi | Fariba Asghari
Nurses Awareness of Patients Rights in a Teaching Hospital

Author(s): Esmaeil Mohammad Nejad | Jamaloddin Begjani | Ghasem Abotalebi | Amir Salari | Seyyedeh Roghayeh Ehsani
Audio Watermarking with Error Correction

Author(s): Aman Chadha | Sandeep Gangundi | Rishabh Goel | Hiren Dave | M. Mani Roja
Kryptos+Graphein= Cryptography

Author(s): Shweta Aggarwal | Utkarsh Jaiswal
Security Analysis and Improvements on WLANs

Author(s): Li Wang | Bala Srinivasan | Nandita Bhattacharjee
Guest Editorial

Author(s): Masato Oguchi | Hyung-Jin Choi | Tae-Jin Lee | Seong Keun Oh | Kwan-Ho You
An Efficient Mutual Authentication and Access Control Scheme for Wireless Sensor Networks in Healthcare

Author(s): Xuan Hung Le | Murad Khalid | Ravi Sankar | Sungyoung Lee
A Short Identity-based Signcryption Scheme in the Multi-PKG over the VANETs

Author(s): Jianhong Zhang | Yuanbo Cui | Xiuna Su
Preventing the next 'SARS' - European healthcare workers' attitudes towards monitoring their health for the surveillance of newly emerging infections: qualitative study

Author(s): Aghaizu Adamma | Elam Gillian | Ncube Fortune | Thomson Gail | Szilágyi Emese | Eckmanns Tim | Poulakou Garyphallia | Catchpole Mike
Evaluation of stressors and coping strategies for stress in Indian anaesthesiologists

Author(s): Shidhaye R | Divekar D | Dhulkhed V | Goel Gaurav | Gupta Arunkumar | Shidhaye Rahul
A Survey of Identity-based Signcryption

Author(s): Li Fagen | Khan Muhammad
Survey Paper: Cryptography Is The Science Of Information Security

Author(s): Mohammed AbuTaha, Mousa Farajallah, Radwan Tahboub, Mohammad Odeh
Permutation based Image Encryption Technique

Author(s): Sesha Pallavi Indrakanti | P.S. Avadhani
Development of Enhanced Token using Picture Password and Public Key Infrastructure Mechanism for Digital Signature

Author(s): Oghenerukevwe E. Oyinloye | Ayodeji .I. Fasiku | Boniface K.Alese | Akinbohun Folake
Utilisation of sexual health services by female sex workers in Nepal

Author(s): Ghimire Laxmi | Smith W | van Teijlingen Edwin
"If the patients decide not to tell what can we do?"- TB/HIV counsellors' dilemma on partner notification for HIV

Author(s): Njozing Barnabas | Edin Kerstin | Sebastián Miguel | Hurtig Anna-Karin
Integrating databases for research on health and performance in small animals and horses in the Nordic countries

Author(s): Egenvall Agneta | Nødtvedt Ane | Roepstorff Lars | Bonnett Brenda
Methods used for successful follow-up in a large scale national cohort study in Thailand

Author(s): Seubsman Sam-ang | Kelly Matthew | Sleigh Adrian | Peungson Janya | Chokkanapitak Jaruwan | Vilainerun Duangkae
Grid based Approach for Data Confidentiality

Author(s): Sreelatha Malempati | Shashi Mogalla
Ensemble Of Blowfish With Chaos Based S Box Design For Text And Image Encryption

Author(s): Jeyamala Chandrasekaran | Subramanyan B | Raman G.S
Cryptovirology: Virus Approach

Author(s): Shivale Saurabh Anandrao

Author(s): B.Krishna Gandhi | S.Sri Lakshmi

The History of Web Application Security Risks

Author(s): Fahad Alanazi | Mohamed Sarrab
Entre coming out et dévoilement.

Author(s): Marta Roca i Escoda
Exploring the subjective burden of confidentiality among physicians in Norway

Author(s): Løvseth Lise Tevik | Leiulfsrud Håkon

Author(s): Dr. B.Chandra Mohan Patnaik | Dr. Ipseeta Satpath | D.Litt
Breaking patient confidentiality: comparing Chilean and French viewpoints regarding the conditions of its acceptability

Author(s): Cecilia Olivari | Maria Teresa Munoz Sastre | Myriam Guedj | Paul Clay Sorum | Etienne Mullet
A Signcryption Scheme based on Elliptic Curve Cryptography

Author(s): R. K. Pateriya | Shreeja Vasudevan
An Implementation of BLOWFISH Encryption Algorithm using KERBEROS Authentication Mechanism

Author(s): Ch Panchamukesh | Prof.T.Venkat Narayana Rao | A.Vijay Kumar
A User Identity Management Protocol for Cloud Computing Paradigm

Author(s): Safiriyu Eludiora | Olatunde Abiona | Ayodeji Oluwatope | Adeniran Oluwaranti | Clement Onime | Lawrence Kehinde
Solutions for 3 Security Problems and its Application in SOA-FCA Service Components Based SDO

Author(s): Nannan Wang | Zhiyi Fang | Kaige Yan | Yu Tang | Xingchao An
Authentication Based and Optimized Routing Technique in Mobile Ad hoc Networks

Author(s): S. Varadhaganapathy | A. M. Natarajan | S. N. Sivanandam
Affiliate Program     

Tango Jona
Tangokurs Rapperswil-Jona