Sciweavers

2108 search results - page 371 / 422
» Encrypted
Sort
View
FGCS
2006
101views more  FGCS 2006»
13 years 10 months ago
Evaluating architectures for independently auditing service level agreements
Web and grid services are quickly maturing as a technology that allows for the integration of applications belonging to different administrative domains, enabling much faster and ...
Ana Carolina Barbosa, Jacques Philippe Sauvé...
CN
2007
111views more  CN 2007»
13 years 10 months ago
Key management for content access control in a hierarchy
The need for content access control in hierarchies (CACH) appears naturally in all contexts where a set of users have different access rights to a set of resources. The hierarchy...
H. Ragab Hassen, Abdelmadjid Bouabdallah, Hatem Be...
COMSUR
2007
101views more  COMSUR 2007»
13 years 10 months ago
A survey of covert channels and countermeasures in computer network protocols
Covert channels are used for the secret transfer of information. Encryption only protects communication from being decoded by unauthorised parties, whereas covert channels aim to ...
Sebastian Zander, Grenville J. Armitage, Philip Br...
IJNSEC
2006
77views more  IJNSEC 2006»
13 years 10 months ago
Towards a Secure Copyright Protection Infrastructure for e-Education Material: Principles Learned from Experience
Copyright of e-Education material is valuable. The need for protecting it is prominent. In the past two years, we have developed an infrastructure called e-Course eXchange (eCX ) ...
Joe Cho-Ki Yau, Lucas Chi Kwong Hui, Siu-Ming Yiu,...
CORR
2007
Springer
133views Education» more  CORR 2007»
13 years 10 months ago
The price of ignorance: The impact of side-information on delay for lossless source-coding
Inspired by the context of compressing encrypted sources, this paper considers the general tradeoff between rate, end-to-end delay, and probability of error for lossless source co...
Cheng Chang, Anant Sahai