Sciweavers

222 search results - page 34 / 45
» Secure Content Delivery using Key Composition
Sort
View
CRITIS
2009
13 years 8 months ago
Energy Theft in the Advanced Metering Infrastructure
Abstract. Global energy generation and delivery systems are transitioning to a new computerized "smart grid". One of the principle components of the smart grid is an adva...
Stephen E. McLaughlin, Dmitry Podkuiko, Patrick Mc...
MJ
2006
84views more  MJ 2006»
13 years 7 months ago
Impact of the surface roughness on the electrical capacitance
A new hybrid approach consists to use the advantages of both systems namely the high geometric aspects of the electrodes of the ultracapacitor and the high dielectric strength of ...
A. Albina, P. L. Taberna, J. P. Cambronne, P. Simo...
ICMCS
2010
IEEE
121views Multimedia» more  ICMCS 2010»
13 years 6 months ago
Estimating cinematographic scene depth in movie shots
In film-making, the distance from the camera to the subject greatly affects the narrative power of a shot. By the alternate use of Long shots, Medium and Close-ups the director i...
Sergio Benini, Luca Canini, Riccardo Leonardi
JSW
2007
90views more  JSW 2007»
13 years 7 months ago
Fine-Grained and Scalable Message Protection in Sensitive Organizations
Abstract— Today electronic messaging services are indispensable to individuals and organizations. If a message contains sensitive information, the integrity and confidentiality ...
Joon S. Park, Ganesh Devarajan
SP
2007
IEEE
137views Security Privacy» more  SP 2007»
14 years 1 months ago
A Cryptographic Decentralized Label Model
Information-flow security policies are an appealing way of specifying confidentiality and integrity policies in information systems. Most previous work on language-based securit...
Jeffrey A. Vaughan, Steve Zdancewic