Sciweavers

5386 search results - page 38 / 1078
» Approaches to Multimedia and Security
Sort
View
MUE
2008
IEEE
121views Multimedia» more  MUE 2008»
14 years 4 months ago
Investigation of Secure Framework for Multipath MANET
A wireless multihop ad hoc network is emerging as an important area for new developments in the ubiquitous network. Although ad hoc network is attractive solution, there are still...
Binod Vaidya, Dong-You Choi, Jong-An Park, Seung J...
DFMA
2005
IEEE
132views Multimedia» more  DFMA 2005»
14 years 3 months ago
Conditional Access in Mobile Systems: Securing the Application
This paper describes two protocols for the secure download of content protection software to mobile devices. The protocols apply concepts from trusted computing to demonstrate tha...
Eimear Gallery, Allan Tomlinson
WOWMOM
2009
ACM
142views Multimedia» more  WOWMOM 2009»
14 years 4 months ago
Securing wireless communication with implanted medical devices using reciprocal carrier-phase quantization
Securing wireless communication with resourceconstrained implanted medical devices is considered. A method for refreshing symmetric encryption keys by reciprocal quantization of t...
Gill R. Tsouri
MM
2004
ACM
107views Multimedia» more  MM 2004»
14 years 3 months ago
Collusion attack on a multi-key secure video proxy scheme
In ACM Multimedia’2002, a video proxy scheme was proposed for secure video delivery. In the scheme, a video is cached in proxies in encrypted form so that it remains nondisclose...
Yongdong Wu, Feng Bao