Sciweavers

838 search results - page 19 / 168
» An Architecture for Network Layer Privacy
Sort
View
IEEEARES
2010
IEEE
13 years 7 months ago
A New DRM Architecture with Strong Enforcement
—We propose a new DRM architecture that utilizes a two-step enforcement process to enable strong security even in the case of a compromised DRM viewer. This is achieved by using ...
Sascha Müller, Stefan Katzenbeisser
HOTOS
2007
IEEE
14 years 10 days ago
Can Ferris Bueller Still Have His Day Off? Protecting Privacy in the Wireless Era
Today's rich and varied wireless environment, including mobile phones, Wi-Fi-enabled laptops, and Bluetooth headsets, poses threats to our privacy that cannot be addressed wi...
Ben Greenstein, Ramakrishna Gummadi, Jeffrey Pang,...
INFOCOM
2008
IEEE
14 years 2 months ago
Cross-Layer Quality of Service Support for UWB Wireless Multimedia Sensor Networks
—Wireless Multimedia Sensor Networks (WMSNs) are networks of wirelessly interconnected devices that allow retrieving video and audio streams, still images, and scalar sensor data...
Tommaso Melodia, Ian F. Akyildiz
WMASH
2003
ACM
14 years 1 months ago
Secure authentication system for public WLAN roaming
A serious challenge for seamless roaming between independent wireless LANs (WLANs) is how best to confederate the various WLAN service providers, each having different trust relat...
Yasuhiko Matsunaga, Ana Sanz Merino, Takashi Suzuk...
CCS
2007
ACM
14 years 2 months ago
Non-volatile memory and disks: avenues for policy architectures
As computing models change, so too do the demands on storage. Distributed and virtualized systems introduce new vulnerabilities, assumptions, and performance requirements on disks...
Kevin R. B. Butler, Stephen E. McLaughlin, Patrick...