Sciweavers

152 search results - page 23 / 31
» Securing Communications in the Smart Home
Sort
View
ICC
2007
IEEE
120views Communications» more  ICC 2007»
14 years 2 months ago
On the Stability of the Malware Free Equilibrium in Cell Phones Networks with Spatial Dynamics
Abstract— Recent outbreaks of virus and worm attacks targeted at cell phones have bought to the forefront the seriousness of the security threat to this increasingly popular mean...
Krishna K. Ramachandran, Biplab Sikdar
PKC
1999
Springer
91views Cryptology» more  PKC 1999»
13 years 12 months ago
A Secure Pay-per View Scheme for Web-Based Video Service
With the development of high speed computer networks, video service on the Web has huge market potential in that the video service can be provided to subscribers with greater time ...
Jianying Zhou, Kwok-Yan Lam
MDM
2007
Springer
111views Communications» more  MDM 2007»
14 years 1 months ago
FragDB - Secure Localized Storage Based on Super-Distributed RFID-Tag Infrastructures
Smart environments and wearables will make the storage and subsequent sharing of digitized multimedia diaries and meeting protocols – whom we meet, or what we say or do – chea...
Marc Langheinrich
MM
2005
ACM
108views Multimedia» more  MM 2005»
14 years 1 months ago
uPen: laser-based, personalized, multi-user interaction on large displays
We present the uPen, a laser pointer combined with a contactpushed switch, three press buttons and a wireless communication module. This novel interaction device allows users to i...
Xiaojun Bi, Yuanchun Shi, Xiaojie Chen, Peifeng Xi...
MOBICOM
1996
ACM
13 years 12 months ago
Security on the Move: Indirect Authentication using Kerberos
Even as mobile computing and network computing are gaining momentum, Internet security is sharing the spotlight. Security and authentication on open networks is already a difficul...
Armando Fox, Steven D. Gribble