Sciweavers

485 search results - page 9 / 97
» Continuous Spatial Authentication
Sort
View
NOSSDAV
2009
Springer
14 years 2 months ago
End-to-end secure delivery of scalable video streams
We investigate the problem of securing the delivery of scalable video streams so that receivers can ensure the authenticity (originality and integrity) of the video. Our focus is ...
Kianoosh Mokhtarian, Mohamed Hefeeda
CCS
2008
ACM
13 years 9 months ago
Cognitive security for personal devices
Humans should be able to think of computers as extensions of their body, as craftsmen do with their tools. Current security models, however, are too unlike those used in human min...
Rachel Greenstadt, Jacob Beal
W2GIS
2007
Springer
14 years 1 months ago
Continuous Perspective Query Processing for 3-D Objects on Road Networks
In order to provide a streaming service of 3-D spatial objects to the mobile clients on a street, we propose a new query type, called continuous perspective query. The perspective ...
Joon-Seok Kim, Kyoung-Sook Kim, Ki-Joune Li
DSOM
2003
Springer
14 years 26 days ago
Idiosyncratic Signatures for Authenticated Execution of Management Code
TrustedFlow™ is a software solution to the problem of remotely authenticating code during execution. A continuous flow of idiosyncratic signatures assures that the software from ...
Mario Baldi, Yoram Ofek, Moti Yung
WCNC
2008
IEEE
14 years 2 months ago
A Location Privacy Preserving Authentication Scheme in Vehicular Networks
Abstract—As an emerging application scenario of wireless technologies, vehicular communications have been initiated not only for enhancing the transportation safety and driving e...
Chenxi Zhang, Rongxing Lu, Pin-Han Ho, Anyi Chen