Sciweavers

772 search results - page 79 / 155
» A Trust-Based Security Architecture for Ubiquitous Computing...
Sort
View
ICDE
2007
IEEE
129views Database» more  ICDE 2007»
14 years 3 months ago
Multimedia Content Repurposing in Ambient Intelligent Environments
Multimedia content repurposing is a challenging task that aims to adapt and deliver media content to client devices by considering the heterogeneity pertaining to users, terminals...
M. Shamim Hossain, M. Anwar Hossain, Abdulmotaleb ...
ICNP
2006
IEEE
14 years 3 months ago
Vault: A Secure Binding Service
— Binding services are crucial building blocks in networks and networked applications. A binding service (e.g., the Domain Name System (DNS)) maps certain information, namely, bi...
Guor-Huar Lu, Changho Choi, Zhi-Li Zhang
CSE
2009
IEEE
14 years 3 months ago
Architectural Support for Automated Software Attack Detection, Recovery, and Prevention
—Attacks on software systems are an increasingly serious problem from an economic and security standpoint. Many techniques have been proposed ranging from simple compiler modifi...
Jesse Sathre, Alex Baumgarten, Joseph Zambreno
CASES
2005
ACM
13 years 11 months ago
Hardware support for code integrity in embedded processors
Computer security becomes increasingly important with continual growth of the number of interconnected computing platforms. Moreover, as capabilities of embedded processors increa...
Milena Milenkovic, Aleksandar Milenkovic, Emil Jov...
ICDCS
2006
IEEE
14 years 3 months ago
Fast data access over asymmetric channels using fair and secure bandwidth sharing
We propose a peer-to-peer architecture designed to overcome asymmetries in upload/download speeds that are typical in end-user dialup, broadband and cellular wireless Internet con...
Sachin Agarwal, Moshe Laifenfeld, Ari Trachtenberg...