Sciweavers

2108 search results - page 232 / 422
» Encrypted
Sort
View
FDTC
2007
Springer
105views Cryptology» more  FDTC 2007»
15 years 10 months ago
Tate Pairing with Strong Fault Resiliency
We present a novel non-linear error coding framework which incorporates strong adversarial fault detection capabilities into identity based encryption schemes built using Tate pai...
Erdinç Öztürk, Gunnar Gaubatz, Be...
ISM
2006
IEEE
114views Multimedia» more  ISM 2006»
15 years 10 months ago
Mobile DRM-Enabled Multimedia Platform for Peer-to-Peer Applications
A mobile Digital Rights Management platform is proposed that follows the DRM reference architecture while including several important functions lacking in the OMA DRM. The platfor...
Mikko Löytynoja, Timo Koskela, Marko Brockman...
119
Voted
SUTC
2006
IEEE
15 years 10 months ago
Implementation of Security Mechanism for Adhoc Wireless Networks Based on X.509 and IEEE 802.1X
To the best of our knowledge, there are only few security schemes for Adhoc networks [1]. In this study, we work on a practical security mechanism for Adhoc networks. To balance b...
Chia Hsing Tung, Yi Quan Chen, Zhi Mou Chen, Shuoh...
MMSEC
2006
ACM
115views Multimedia» more  MMSEC 2006»
15 years 10 months ago
An improvement to a biometric.based multimedia content protection scheme
A biometric-based method for multimedia content protection was recently proposed. The method relies on biometric data of the user and a layered encryption mechanism to achieve con...
Daniel Socek, Michal Sramka, Oge Marques, Dubravko...
ICMCS
2005
IEEE
142views Multimedia» more  ICMCS 2005»
15 years 9 months ago
An adaptive scalable watermark scheme for high-quality audio archiving and streaming applications
In this paper, we present a scalable (i.e. lossy-to-lossless) watermark scheme based on a recently standardized scalable audio coder – AAZ [4]. The proposed framework enables th...
Zhi Li, Qibin Sun, Yong Lian