Skip to main content

and
Your search also matched 39 preview-only Content is preview-only when you or your institution have not yet subscribed to it.

By making our abstracts and previews universally accessible we help you purchase only the content that is relevant to you.
results, e.g.

Nanoliposome-encapsulated ellagic acid prevents cyclophosphamide-induced rat liver damage

Include preview-only content
  1. Chapter and Conference Paper

    AU2EU: Privacy-Preserving Matching of DNA Sequences

    Advances in DNA sequencing create new opportunities for the use of DNA data in healthcare for diagnostic and treatment purposes, but also in many other health and well-being services. This brings new challenge...

    Tanya Ignatenko, Milan Petković in Information Security Theory and Practice. … (2014)

  2. Chapter and Conference Paper

    Hunting the Unknown

    Data leakage causes significant losses and privacy breaches worldwide. In this paper we present a white-box data leakage detection system to spot anomalies in database transactions. We argue that our approach rep...

    Elisa Costante, Jerry den Hartog in Data and Applications Security and Privacy… (2014)

  3. Chapter and Conference Paper

    Data Leakage Quantification

    The detection and handling of data leakages is becoming a critical issue for organizations. To this end, data leakage solutions are usually employed by organizations to monitor network traffic and the use of p...

    Sokratis Vavilis, Milan Petković in Data and Applications Security and Privacy… (2014)

  4. Chapter and Conference Paper

    Impact of ICT on Home Healthcare

    Innovation in information and communication technology has a great potential to create large impact on modern healthcare. However, for the new technologies to be adopted, the innovations have to be meaningful ...

    Sokratis Vavilis, Milan Petković in ICT Critical Infrastructures and Society (2012)

  5. Chapter and Conference Paper

    Ciphertext-Policy Attribute-Based Broadcast Encryption Scheme

    In this work, we design a new attribute-based encryption scheme with the revocation capability. In the proposed schemes, the user (broadcaster) encrypts the data according to an access policy over the set of a...

    Muhammad Asim, Luan Ibraimi, Milan Petković in Communications and Multimedia Security (2011)

  6. Chapter and Conference Paper

    The Interval Revocation Scheme for Broadcasting Messages to Stateless Receivers

    The Broadcast Encryption methods, often referred to as revocation schemes, allow data to be efficiently broadcast to a dynamically changing group of users. A special case is when the receivers are stateless [2...

    Anna Zych, Milan Petković, Willem Jonker in Data and Applications Security XXI (2007)

  7. Chapter and Conference Paper

    Cryptographically Enforced Personalized Role-Based Access Control

    The present paper addresses privacy and security enhancements to a basic role-based access control system. The contribution is twofold. First, the paper presents an approach to personalized access control, i.e...

    Milan Petković, Claudine Conrado in Security and Privacy in Dynamic Environmen… (2006)