Sciweavers

71 search results - page 1 / 15
» Hiding HSM Systems from the User
Sort
View
MSS
1999
IEEE
73views Hardware» more  MSS 1999»
13 years 9 months ago
Hiding HSM Systems from the User
File life-times longer than the life-time of HSMsystems make it necessary to move files from one HSM-system to another. Such a migration takes a long time and cannot be hidden fro...
Hartmut Reuter
LOCWEB
2009
ACM
13 years 9 months ago
Hiding the complexity of LBS
While the demand for Location-based Services (LBS) is strongly increasing, technical laymen are not yet able to build and provide location-aware applications. This paper presents ...
Matthias Böhmer, Gernot Bauer, Wolfgang Wicht
SEC
2008
13 years 6 months ago
Hiding in Groups: On the Expressiveness of Privacy Distributions
Many applications inherently disclose information because perfect privacy protection is prohibitively expensive. RFID tags, for example, cannot be equipped with the cryptographic p...
Karsten Nohl, David Evans
IH
1998
Springer
13 years 9 months ago
Attacks on Copyright Marking Systems
In the last few years, a large number of schemes have been proposed for hiding copyright marks and other information in digital pictures, video, audio and other multimedia objects....
Fabien A. P. Petitcolas, Ross J. Anderson, Markus ...