Sciweavers

1166 search results - page 34 / 234
» Adaptively Secure Broadcast
Sort
View
CRYPTO
2004
Springer
138views Cryptology» more  CRYPTO 2004»
14 years 4 months ago
Secure Identity Based Encryption Without Random Oracles
We construct two efficient Identity Based Encryption (IBE) systems that are selective identity secure without the random oracle model. Selective identity secure IBE is a slightly w...
Dan Boneh, Xavier Boyen
IEEEARES
2010
IEEE
14 years 4 months ago
Architecture-Aware Adaptive Deployment of Contextual Security Policies
—Deploying a security policy may prove difficult whenever the system does not embed all necessary security functionalities. Some specific functionalities are required to accura...
Stere Preda, Nora Cuppens-Boulahia, Fréd&ea...
ICASSP
2009
IEEE
14 years 5 months ago
Low-delay scheduling for Grassmannian beamforming with a SINR constraint
We are presenting an algorithm for scheduling users in a single-cell broadcast scenario. The presented algorithm aims to minimize the number of transmissions that are necessary to...
Claude Simon, Geert Leus
ICMCS
2006
IEEE
119views Multimedia» more  ICMCS 2006»
14 years 5 months ago
Secured MPEG-21 Digital Item Adaptation for H.264 Video
Seamless adaptation and transcoding techniques to adapt the digital content have achieved significant focus to serve the consumers with the desired content in a feasible way. With...
Razib Iqbal, Shervin Shirmohammadi, Abdulmotaleb E...
ICMCS
2008
IEEE
108views Multimedia» more  ICMCS 2008»
14 years 5 months ago
Lower attentive region detection for virtual content insertion in broadcast video
Virtual Content Insertion (VCI) is an emerging application of video analysis. For VCI the spatial position is very important as improper placement will make the insertion intrusiv...
Huiying Liu, Shuqiang Jiang, Qingming Huang, Chang...