Sciweavers

5088 search results - page 918 / 1018
» Rich Internet Applications
Sort
View
CNSR
2004
IEEE
218views Communications» more  CNSR 2004»
15 years 8 months ago
CSN: A Network Protocol for Serving Dynamic Queries in Large-Scale Wireless Sensor Networks
A fundamental problem that confronts future applications of sensor networks is how to efficiently locate the sensor node that stores a particular data item. It is known that distr...
Muneeb Ali, Zartash Afzal Uzmi
DATE
2004
IEEE
102views Hardware» more  DATE 2004»
15 years 8 months ago
High Security Smartcards
New consumer appliances such as PDA, Set Top Box, GSM/UMTS terminals enable an easy access to the internet and strongly contribute to the development of ecommerce and m-commerce s...
Marc Renaudin, G. Fraidy Bouesse, Ph. Proust, J. P...
CCS
2006
ACM
15 years 8 months ago
Attribute-based encryption for fine-grained access control of encrypted data
As more sensitive data is shared and stored by third-party sites on the Internet, there will be a need to encrypt data stored at these sites. One drawback of encrypting data, is t...
Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Wate...
CCS
2006
ACM
15 years 8 months ago
Deniable authentication and key exchange
We extend the definitional work of Dwork, Naor and Sahai from deniable authentication to deniable key-exchange protocols. We then use these definitions to prove the deniability fe...
Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk
DRM
2006
Springer
15 years 8 months ago
Consumers, fans, and control: what the games industry can teach Hollywood about DRM
Through legislation and technology the film industry has been seeking to fully control usage of the bits it creates; their model is "restrictive" digital-rights manageme...
Susan Landau, Renée Stratulate, Doug Twille...