Sciweavers

222 search results - page 36 / 45
» Secure Content Delivery using Key Composition
Sort
View
ESAS
2004
Springer
14 years 1 months ago
Secure Overlay for Service Centric Wireless Sensor Networks
Sensor networks consist of a potentially huge number of very small and resource limited self-organizing devices. Those devices offer different services and use services provided b...
Hans-Joachim Hof, Erik-Oliver Blaß, Martina ...
CRYPTO
2000
Springer
136views Cryptology» more  CRYPTO 2000»
13 years 12 months ago
Long-Lived Broadcast Encryption
In a broadcast encryption scheme, digital content is encrypted to ensure that only privileged users can recover the content from the encrypted broadcast. Key material is usually he...
Juan A. Garay, Jessica Staddon, Avishai Wool
ICIP
1999
IEEE
14 years 9 months ago
Automatic Image Orientation Detection
Automatic detection and correction of image orientation is of great importance in intelligent image processing. In this paper, we present an automatic image orientation detection ...
Aditya Vailaya, HongJiang Zhang, Anil K. Jain
IJSNET
2006
106views more  IJSNET 2006»
13 years 7 months ago
Efficient anonymity schemes for clustered wireless sensor networks
: In this paper, we propose two simple and efficient schemes for establishing anonymity in Clustered Wireless Sensor Networks (CWSNs). The first scheme Simple Anonymity Scheme (SAS...
Satyajayant Misra, Guoliang Xue
CHI
2009
ACM
14 years 8 months ago
Waterhouse: enabling secure e-mail with social networking
We present Waterhouse, a system for sending and receiving cryptographically protected electronic mail ("secure e-mail"). We show how an existing e-mail interface can be ...
Alex P. Lambert, Stephen M. Bezek, Karrie Karahali...