Sciweavers

1323 search results - page 157 / 265
» Updatable Security Views
Sort
View
135
Voted
CSREASAM
2007
15 years 4 months ago
Allocation of Partitioned Data by Using A Neural Network Based Approach
In this paper, we investigate allocation of data partitions in the network for data objects that are partitioned by using secret sharing schemes [12] or erasure coding schemes [11...
Manghui Tu, Dongfeng Wang, Peng Li, Nasser Tadayon
111
Voted
IADIS
2004
15 years 3 months ago
The efficient communications for VPN access of mobile nodes over mobile IPV6
Mobile IPv6 is thought to be dominant protocol for providing mobility. In the near future, most portable communication devices will deploy Mobile IPv6 mechanism. Our main concerns...
Hyungkyu Lee, Jaehoon Nah, Kyoil Jung
ICMCS
2010
IEEE
171views Multimedia» more  ICMCS 2010»
15 years 3 months ago
Transforming a pattern identifier into biometric key generators
According to a popular pattern recognition method, this paper proposes two methods to generate a secret from individual's biometric information, such as fingerprint feature p...
Yongdong Wu, Bo Qiu
CN
2010
100views more  CN 2010»
15 years 2 months ago
A survey of network virtualization
Due to the existence of multiple stakeholders with conflicting goals and policies, alterations to the existing Internet are now limited to simple incremental updates; deployment o...
N. M. Mosharaf Kabir Chowdhury, Raouf Boutaba
IJNSEC
2007
107views more  IJNSEC 2007»
15 years 2 months ago
A Traitor Tracing Scheme Based on the RSA System
Traitor tracing schemes constitute a very useful tool against piracy in the context of digital content broadcast. In such multi-recipient encryption schemes, the data-suppliers ca...
Bo Yang, Hua Ma, Shenglin Zhu