Sciweavers

986 search results - page 59 / 198
» Protecting the Intranet Against
Sort
View
ISCC
2009
IEEE
152views Communications» more  ISCC 2009»
14 years 3 months ago
Perceptual based voice multi-hop transmission over wireless sensor networks
Abstract—Multimedia applications over wireless sensor networks (WSNs) are rapidly gaining interest by the research community in order to develop new and mission critical services...
M. Petracca, G. Litovsky, A. Rinotti, Marco Tacca,...
HOST
2008
IEEE
14 years 3 months ago
IC Activation and User Authentication for Security-Sensitive Systems
—A number of applications depend on the protection of security-sensitive hardware, preventing unauthorized users from gaining access to the functionality of the integrated circui...
Jiawei Huang, John Lach
ASIACRYPT
2000
Springer
14 years 1 months ago
Distributed Oblivious Transfer
The mobile agent is a fundamental building block of the mobile computing paradigm. In mobile agent security, oblivious transfer (OT) from a trusted party can be used to protect th...
Moni Naor, Benny Pinkas
ACNS
2010
Springer
156views Cryptology» more  ACNS 2010»
14 years 1 months ago
COP: A Step toward Children Online Privacy
We propose COP, a client-side system for protecting children’s online privacy and empowering parental control over children’s information disclosure with little manual effort. ...
Wei Xu, Sencun Zhu, Heng Xu
NETWORK
2006
109views more  NETWORK 2006»
13 years 9 months ago
Can DiffServ guarantee IP QoS under failures?
As ISPs and telcos converge toward all-IP network infrastructures, the problem of service reliability becomes more acute. In this article, we investigate to what extent DiffServ c...
Brunilde Sansò, Christian Awad, André...