Sciweavers

2108 search results - page 330 / 422
» Encrypted
Sort
View
EDOC
2006
IEEE
15 years 8 months ago
Secure Dissemination of XML Content Using Structure-based Routing
The paper proposes an approach to content dissemination that exploits the structural properties of XML Document Object Model in order to provide efficient dissemination by at the...
Ashish Kundu, Elisa Bertino
GLOBECOM
2006
IEEE
15 years 8 months ago
Secure Aggregation in Large Scale Overlay Networks
Overlay networks have been very useful in solving large scale data dissemination problems. In this paper, we consider the case of data gathering which is the inverse of disseminat...
Waseem Ahmad, Ashfaq A. Khokhar
GLOBECOM
2006
IEEE
15 years 8 months ago
Efficient transmission of MP3 streams over VPNs
— Multimedia applications communicating over a next generation VPN architecture that allows selective encryption can leverage the security properties of a VPN with its performanc...
Shashank Khanvilkar, Ashfaq A. Khokhar
ICMB
2006
IEEE
102views Business» more  ICMB 2006»
15 years 8 months ago
Card-based Macropayment for Mobile Phones
Most new entrants into the mobile commerce marketplace are faced with a paradox; how can we attract users without merchants, and how can we attract merchants without customers? Wi...
Philip Garner, Reuben Edwards, Paul Coulton
133
Voted
ICMB
2006
IEEE
206views Business» more  ICMB 2006»
15 years 8 months ago
E-Pass Using DRM in Symbian v8 OS and TrustZone : Securing Vital Data on Mobile Devices
The mobile phone industry has established a large customer base market, providing a wide range of mobile applications from voice and data services to digital media such as digital...
Wan Huzaini Wan Hussin, Reuben Edwards, Paul Coult...