Sciweavers

726 search results - page 72 / 146
» An Access Control Scheme for Protecting Personal Data
Sort
View
WOWMOM
2006
ACM
111views Multimedia» more  WOWMOM 2006»
14 years 1 months ago
A New MAC Scheme for Very High-Speed WLANs
We consider the medium access control (MAC) layer for very high-speed Wireless LANs, which is designed to support rich multimedia applications such as highdefinition television. ...
Tianji Li, Qiang Ni, David Malone, Douglas J. Leit...
MMSEC
2004
ACM
104views Multimedia» more  MMSEC 2004»
14 years 1 months ago
Key-assignment strategies for CPPM
CSS, the first system to protect multimedia content on the new DVD medium failed badly, because both its encryption algorithm and its key management could easily be broken. A new ...
André Adelsbach, Jörg Schwenk
GLOBECOM
2007
IEEE
14 years 2 months ago
Voice Service Support in Mobile Ad Hoc Networks
— Mobile ad hoc networks are expected to support voice traffic. The requirement for small delay and jitter of voice traffic poses a significant challenge for medium access con...
Hai Jiang, Ping Wang, H. Vincent Poor, Weihua Zhua...
TSC
2010
130views more  TSC 2010»
13 years 2 months ago
Secure Abstraction Views for Scientific Workflow Provenance Querying
bstraction Views for Scientific Workflow Provenance Querying Artem Chebotko, Member, IEEE, Shiyong Lu, Senior Member, IEEE, Seunghan Chang, Farshad Fotouhi, Member, IEEE, and Ping ...
Artem Chebotko, Shiyong Lu, Seunghan Chang, Farsha...
DRM
2003
Springer
14 years 27 days ago
Constructing a virtual primary key for fingerprinting relational data
Agrawal and Kiernan’s watermarking technique for database relations [1] and Li et al’s fingerprinting extension [6] both depend critically on primary key attributes. Hence, t...
Yingjiu Li, Vipin Swarup, Sushil Jajodia