Sciweavers

222 search results - page 8 / 45
» Secure Content Delivery using Key Composition
Sort
View
IJNSEC
2008
140views more  IJNSEC 2008»
13 years 7 months ago
A Secure Group Key Management Scheme for Wireless Cellular Systems
In wireless networks, secure multicast protocols are more difficult to implement efficiently due to the dynamic nature of the multicast group and the scarcity of bandwidth at the ...
Hwa Young Um, Edward J. Delp
ICCSA
2005
Springer
14 years 1 months ago
Secure Forwarding Scheme Based on Session Key Reuse Mechanism in HMIPv6 with AAA
Abstract. Due to an increasing number of portable devices over 785million world Internet users, a support for quality of service (QoS) and security becomes a significant issue in ...
Kwang Chul Jeong, Hyunseung Choo, Sungchang Lee
HICSS
2002
IEEE
132views Biometrics» more  HICSS 2002»
14 years 15 days ago
Secure Transmission of the Prescription Order Communication System Based on the Internet and the Public-Key Infrastructure Using
This research paper presents a new system's design and development of the prescription order communication system (POCS) based on the Internet between the hospital and the ph...
Won Jay Song, Byung-Ha Ahn
PERCOM
2006
ACM
14 years 7 months ago
Composition Trust Bindings in Pervasive Computing Service Composition
In pervasive computing, devices or peers may implement or compose services using services from other devices or peers, and may use components from various sources. A composition t...
John Buford, Rakesh Kumar, Greg Perkins
MM
1993
ACM
176views Multimedia» more  MM 1993»
13 years 11 months ago
A Digital On-Demand Video Service Supporting Content-Based Queries
Abstract–Video-on-demand represents a key demonstrative application for enabling multimedia technology in communication, database, and interface research. This application requir...
Thomas D. C. Little, Gulrukh Ahanger, R. J. Folz, ...