Sciweavers

15379 search results - page 383 / 3076
» Protecting users from
Sort
View
ICIP
2007
IEEE
16 years 5 months ago
Fine Grain Adaptive FEC (FGA-FEC) Over Wireless Networks
In this paper, we extend our proposed FGA-FEC coding scheme, a generalized MD-FEC method, to wireless networks. To protect the encoded scalable video bitstream over a lossy channe...
Yufeng Shan, John W. Woods, Shivkumar Kalyanaraman
PDCAT
2009
Springer
15 years 10 months ago
Bifrost : A Novel Anonymous Communication System with DHT
An immense amount of information is processed on the Internet due to its spread, increasing the severity of such problems as the disclosure of personal information; privacy protec...
Masaki Kondo, Shoichi Saito, Kiyohisa Ishiguro, Hi...
HICSS
2008
IEEE
108views Biometrics» more  HICSS 2008»
15 years 10 months ago
Free-Riding and Competition in Network Markets for Digital Goods
— We present a continuous, stochastic model — the first of its kind — for the monetary flow in multi-level markets allowing for the quantitative assessment of the incentive...
Andreas U. Schmidt
WIMOB
2008
IEEE
15 years 10 months ago
Random Beacon for Privacy and Group Security
Abstract—Most contemporary security mechanisms and protocols include exchange of random or time-variant nonces as an essential means of protection against replay and other threat...
Aleksi Saarela, Jan-Erik Ekberg, Kaisa Nyberg
WIMOB
2008
IEEE
15 years 10 months ago
Securing Dynamic Home Agent Address Discovery with Cryptographically Generated Addresses and RSA Signatures
With Dynamic Home Agent Address Discovery (DHAAD), as specified in Mobile IPv6, a Mobile Node can discover the address of a suitable Home Agent on the home link. However, DHAAD suf...
Christian Bauer, Max Ehammer