Sciweavers

1875 search results - page 351 / 375
» A Calculus of Broadcasting Systems
Sort
View
PODC
2003
ACM
14 years 1 months ago
Scalable public-key tracing and revoking
Traitor Tracing Schemes constitute a very useful tool against piracy in the context of digital content broadcast. In such multi-recipient encryption schemes, each decryption key is...
Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti...
SENSYS
2003
ACM
14 years 1 months ago
Bluetooth and sensor networks: a reality check
The current generation of sensor nodes rely on commodity components. The choice of the radio is particularly important as it impacts not only energy consumption but also software ...
Martin Leopold, Mads Bondo Dydensborg, Philippe Bo...
WPES
2003
ACM
14 years 1 months ago
Anonymous credentials with biometrically-enforced non-transferability
We present a model and protocol for anonymous credentials. Rather than using deterrents to ensure non-transferability, our model uses secure hardware with biometric authentication...
Russell Impagliazzo, Sara Miner More
ISWC
1998
IEEE
14 years 27 days ago
Parasitic Power Harvesting in Shoes
system to date has served all of the needs of wearable computing--light weight, minimum effort, high power generation, convenient power delivery, and good power regulation. We beli...
John Kymissis, Clyde Kendall, Joseph A. Paradiso, ...
TCSV
2008
298views more  TCSV 2008»
13 years 8 months ago
TrustStream: A Secure and Scalable Architecture for Large-Scale Internet Media Streaming
Abstract--To effectively address the explosive growth of multimedia applications over the Internet, a large-scale media streaming system has to fully take into account the issues o...
Hao Yin, Chuang Lin, Qian Zhang, Zhijia Chen, Dape...