Sciweavers

5386 search results - page 56 / 1078
» Approaches to Multimedia and Security
Sort
View
ACSW
2003
13 years 11 months ago
Provably Secure Key Exchange: An Engineering Approach
We promote an engineering approach to design of provably secure key exchange protocols. Using the model of Canetti and Krawczyk we present a systematic method to arrive at efficie...
Yiu Shing Terry Tin, Colin Boyd, Juanma Gonz&aacut...
DEXAW
2007
IEEE
111views Database» more  DEXAW 2007»
14 years 4 months ago
A Security Engineering Process based on Patterns
We present a security engineering process based on security problem frames and concretized security problem frames. Both kinds of frames constitute patterns for analyzing security...
Denis Hatebur, Maritta Heisel, Holger Schmidt
MM
2000
ACM
100views Multimedia» more  MM 2000»
14 years 2 months ago
Stochastic resource prediction and admission for interactive sessions on multimedia servers
In highly interactive multimedia applications startup latency is significant, and may negatively impact performance and Quality of Service (QoS). To avoid this, our approach is t...
Matthias Friedrich, Silvia Hollfelder, Karl Aberer
ISN
2000
Springer
127views Communications» more  ISN 2000»
14 years 1 months ago
Supporting Advanced Multimedia Telecommunications Services Using the Distributed Component Object Model
The demand for a great variety of sophisticated telecommunications services with multimedia characteristics is increasing. This trend highlights the need for the efficient creation...
Dionisis X. Adamopoulos, George Pavlou, Constantin...
WPES
2003
ACM
14 years 3 months ago
Leveraging the "Multi" in secure multi-party computation
Secure Multi-Party Computation enables parties with private data to collaboratively compute a global function of their private data, without revealing that data. The increase in s...
Jaideep Vaidya, Chris Clifton