Sciweavers

151 search results - page 8 / 31
» Flexible Alias Protection
Sort
View
IJNSEC
2008
145views more  IJNSEC 2008»
13 years 7 months ago
Efficient User Authentication and Key Agreement with User Privacy Protection
Using smart cards, remote user authentication and key agreement can be simplified, flexible, and efficient for creating a secure distributed computers environment. Addition to use...
Wen-Shenq Juang, Jing-Lin Wu
ICIP
2008
IEEE
14 years 2 months ago
H.264/AVC video scrambling for privacy protection
In this paper, we address the problem of privacy in video surveillance systems. More specifically, we consider the case of H.264/AVC which is the state-of-the-art in video coding....
Frédéric Dufaux, Touradj Ebrahimi
ATAL
2006
Springer
13 years 11 months ago
Performance analysis of untraceability protocols for mobile agents using an adaptable framework
Recently we had proposed two untraceability protocols for mobile agents and began investigating their quality. We believe that quality evaluation of security protocols should exte...
Rafal Leszczyna, Janusz Górski
ICMCS
2005
IEEE
110views Multimedia» more  ICMCS 2005»
14 years 1 months ago
License management scheme with anonymous trust for digital rights management
One of the major issues raised by Digital Rights Management systems concerns the protection of the user’s privacy and anonymous consumption of content. However, most existing li...
Jiang Zhang, Bin Li, Li Zhao, Shi-Qiang Yang
ICPADS
2006
IEEE
14 years 1 months ago
Flexible, Low-overhead Event Logging to Support Resource Scheduling
Flexible resource management and scheduling policies require detailed system-state information. Traditional, monolithic operating systems with a centralized kernel derive the requ...
Jan Stoess, Volkmar Uhlig