Sciweavers

1040 search results - page 146 / 208
» Privacy for Telecom Services
Sort
View
DRM
2003
Springer
14 years 1 months ago
How DRM-based content delivery systems disrupt expectations of "personal use"
We set out to examine whether current, DRM-based online offerings of music and movies accord with consumers’ current expectations regarding the personal use of copyrighted works...
Deirdre K. Mulligan, John Han, Aaron J. Burstein
CCGRID
2002
IEEE
14 years 23 days ago
NEVRLATE: Scalable Resource Discovery
A scalable and expressive peer-to-peer (P2P) networking and computing framework requires efficient resource discovery services. Here we propose NEVRLATE, for Network-Efficient V...
Ajay Chander, Steven Dawson, Patrick Lincoln, Davi...
ECWEB
2000
Springer
110views ECommerce» more  ECWEB 2000»
14 years 4 days ago
Secure PC-Franking for Everyone
PC franking systems allow customers to download postage value into their PCs and to print postage value onto envelopes or mailing labels by using regular desktop printers connected...
Gerrit Bleumer
CSREASAM
2006
13 years 9 months ago
A Framework for the User-Oriented Personal Information Protection
- Thanks to the spread of mobile technologies, we can access to the network anytime and from anywhere. In the near future, we will enable to realize the ubiquitous computing enviro...
Kenichi Takahashi, Kouichi Sakurai
CORR
2010
Springer
176views Education» more  CORR 2010»
13 years 8 months ago
Emergency Response Communications and Associated Security Challenges
The natural or man-made disaster demands an efficient communication and coordination among first responders to save life and other community resources. Normally, the traditional c...
Muhammad Ibrahim Channa, Kazi M. Ahmed