Sciweavers

287 search results - page 20 / 58
» An Information Security Strategy for Networkable Devices
Sort
View
DRM
2003
Springer
14 years 1 months ago
Digital rights management in a 3G mobile phone and beyond
In this paper we examine how copyright protection of digital items can be securely managed in a 3G mobile phone and other devices. First, the basic concepts, strategies, and requi...
Thomas S. Messerges, Ezzat A. Dabbish
ACMICEC
2007
ACM
163views ECommerce» more  ACMICEC 2007»
14 years 1 days ago
Digital rights management using a mobile phone
This paper focuses on the problem of preventing illegal copying of digital assets without jeopardising the right of legitimate licence holders to transfer content between their ow...
Imad M. Abbadi, Chris J. Mitchell
ICCCN
2007
IEEE
14 years 2 months ago
Localization of Wireless Sensor Nodes Using Proximity Information
Abstract— This paper proposes a simple yet efficient localization algorithm for GPS-free sensor nodes in wireless sensor networks (WSN). Our approach is hybrid in the sense that...
Piyush Agrawal, R. K. Ghosh, Sajal K. Das
MOBISYS
2008
ACM
14 years 7 months ago
Anonysense: privacy-aware people-centric sensing
Personal mobile devices are increasingly equipped with the capability to sense the physical world (through cameras, microphones, and accelerometers, for example) and the network w...
Cory Cornelius, Apu Kapadia, David Kotz, Daniel Pe...
JSAC
2006
114views more  JSAC 2006»
13 years 8 months ago
SCAN: self-organized network-layer security in mobile ad hoc networks
Protecting the network layer from malicious attacks is an important yet challenging security issue in mobile ad hoc networks. In this paper we describe SCAN, a unified networklayer...
Hao Yang, J. Shu, Xiaoqiao Meng, Songwu Lu