Sciweavers

2172 search results - page 371 / 435
» Distributed User Access Control in Sensor Networks
Sort
View
116
Voted
WISEC
2009
ACM
15 years 9 months ago
Link-layer protection in 802.11i WLANS with dummy authentication
The current 802.11i standard can provide data confidentiality, integrity and mutual authentication in enterprise Wireless Local Area Networks (WLANs). However, secure communicati...
Zhimin Yang, Adam C. Champion, Boxuan Gu, Xiaole B...
COLCOM
2007
IEEE
15 years 4 months ago
Using context to assist the adaptation of protected multimedia content in virtual collaboration applications
—This paper proposes a framework for a virtual classroom application based on a Virtual Collaboration System (VCS), which is being developed under the VISNET II Network of Excell...
Maria Teresa Andrade, Hemantha Kodikara Arachchi, ...
145
Voted
COMPSAC
1998
IEEE
15 years 6 months ago
Allocating Data Objects to Multiple Sites for Fast Browsing of Hypermedia Documents
Many world wide web applications require access, transfer, and synchronization of large multimedia data objects (MDOs) (such as, audio, video, and images) across the communication...
Siu-Kai So, Ishfaq Ahmad, Kamalakar Karlapalem
103
Voted
HICSS
2003
IEEE
126views Biometrics» more  HICSS 2003»
15 years 7 months ago
A Watermarking Infrastructure for Enterprise Document Management
Digital watermarking is a promising technology to embed copyright information as unperceivable signals in digital contents. Although various watermarking techniques have been empl...
Shing-Chi Cheung, Dickson K. W. Chiu
118
Voted
JITECH
2010
116views more  JITECH 2010»
15 years 22 days ago
Design theory for dynamic complexity in information infrastructures: the case of building internet
We propose a design theory that tackles dynamic complexity in the design for Information Infrastructures (IIs) defined as a shared, open, heterogeneous and evolving socio-technica...
Ole Hanseth, Kalle Lyytinen