Sciweavers

2108 search results - page 332 / 422
» Encrypted
Sort
View
ISM
2006
IEEE
95views Multimedia» more  ISM 2006»
15 years 8 months ago
Digital Rights Management for Video Sensor Network
Video sensor network is evolving from an isolated system to an integral component of the global information infrastructure. In this paper, we argue that when video sensor network ...
Taojun Wu, Liang Dai, Yuan Xue, Yi Cui
114
Voted
MICRO
2006
IEEE
114views Hardware» more  MICRO 2006»
15 years 8 months ago
Authentication Control Point and Its Implications For Secure Processor Design
Secure processor architecture enables tamper-proof protection on software that addresses many difficult security problems such as reverse-engineering prevention, trusted computing...
Weidong Shi, Hsien-Hsin S. Lee
RSP
2006
IEEE
116views Control Systems» more  RSP 2006»
15 years 8 months ago
Performance Evaluation of an Adaptive FPGA for Network Applications
This paper presents the design and the performance evaluation of a coarse-grain dynamically reconfigurable platform for network applications. The platform consists of two MicroBla...
Christoforos Kachris, Stamatis Vassiliadis
SP
2006
IEEE
193views Security Privacy» more  SP 2006»
15 years 8 months ago
Analysis of the Linux Random Number Generator
Linux is the most popular open source project. The Linux random number generator is part of the kernel of all Linux distributions and is based on generating randomness from entrop...
Zvi Gutterman, Benny Pinkas, Tzachy Reinman
ACMICEC
2006
ACM
112views ECommerce» more  ACMICEC 2006»
15 years 8 months ago
Persistent information security: beyond the e-commerce threat model
This paper introduces a new class of information security solution. The core technology, to authorize and track the use of digital files, was originally developed in eCommerce app...
Merv Matson, Mihaela Ulieru