Sciweavers

2403 search results - page 353 / 481
» Cyberinsurance in IT Security Management
Sort
View
MOBIHOC
2007
ACM
14 years 7 months ago
A random perturbation-based scheme for pairwise key establishment in sensor networks
A prerequisite for secure communications between two sensor nodes is that these nodes exclusively share a pairwise key. Although numerous pairwise key establishment (PKE) schemes ...
Wensheng Zhang, Minh Tran, Sencun Zhu, Guohong Cao
CASES
2005
ACM
13 years 10 months ago
Hardware support for code integrity in embedded processors
Computer security becomes increasingly important with continual growth of the number of interconnected computing platforms. Moreover, as capabilities of embedded processors increa...
Milena Milenkovic, Aleksandar Milenkovic, Emil Jov...
ODRL
2004
13 years 9 months ago
Nonius: Implementing a DRM Extension to an XML Browser
The paper describes experiences, ideas, and problems that were discovered while developing a digital rights management (DRM) extension to an XML browser. The supported rights desc...
Olli Pitkänen, Ville Saarinen, Jari Anttila, ...
IH
1998
Springer
14 years 15 days ago
Steganography in a Video Conferencing System
We describe a steganographic system which embeds secret messages into a video stream. We examine the signal path which typically includes discrete cosine transformation (DCT) based...
Andreas Westfeld, Gritta Wolf
DATE
2005
IEEE
141views Hardware» more  DATE 2005»
13 years 10 months ago
Multimedia Applications of Multiprocessor Systems-on-Chips
This paper surveys the characteristics of multimedia systems. Multimedia applications today are dominated by compression and decompression, but multimedia devices must also implem...
Wayne Wolf