Sciweavers

354 search results - page 57 / 71
» Key management for content access control in a hierarchy
Sort
View
ELPUB
2007
ACM
15 years 1 months ago
EPrints 3.0: New Capabilities for Maturing Repositories
There are now a large number of repositories in the world, contributing a significant amount of content to the world's scholars and scientists. The landscape has changed sinc...
Leslie Carr
CORR
2010
Springer
168views Education» more  CORR 2010»
14 years 9 months ago
Network evolution and QOS provisioning for integrated femtocell/macrocell networks
Integrated femtocell/macrocell networks, comprising a conventional cellular network overlaid with femtocells, offer an economically appealing way to improve coverage, quality of s...
Mostafa Zaman Chowdhury, Yeong Min Jang, Zygmunt J...
MTA
2008
186views more  MTA 2008»
14 years 9 months ago
Tactile web browsing for blind people
Information on the World Wide Web becomes more and more important for our society. For blind people this is a chance to access more information for their everyday life. In this pap...
Martin Rotard, Christiane Taras, Thomas Ertl
ICDIM
2007
IEEE
15 years 1 months ago
Exploiting contextual handover information for versatile services in NGN environments
Users in ubiquitous and pervasive computing environments will be much more empowered in ways to access and to control their navigation. Handover, the vital event in which a user c...
Edson dos Santos Moreira, David N. Cottingham, Jon...
UCS
2007
Springer
15 years 3 months ago
RFID Privacy Using Spatially Distributed Shared Secrets
Many of today’s proposed RFID privacy schemes rely on the encryption of tag IDs with user-chosen keys. However, password management quickly becomes a bottleneck in such proposals...
Marc Langheinrich, Remo Marti