Sciweavers

1255 search results - page 144 / 251
» On Simple and Secure Key Distribution
Sort
View
PCM
2004
Springer
179views Multimedia» more  PCM 2004»
15 years 9 months ago
Digital Video Scrambling Method Using Intra Prediction Mode
Abstract. As the amount of digitalized contents increases rapidly, ‘security’ necessarily arises as one of the most important issues. The main distribution channel of digital c...
Jinhaeng Ahn, Hiuk Jae Shim, Byeungwoo Jeon, Incho...
ESORICS
2010
Springer
15 years 5 months ago
An Authorization Framework Resilient to Policy Evaluation Failures
Abstract. In distributed computer systems, it is possible that the evaluation of an authorization policy may suffer unexpected failures, perhaps because a sub-policy cannot be eval...
Jason Crampton, Michael Huth
135
Voted
SP
2002
IEEE
200views Security Privacy» more  SP 2002»
15 years 3 months ago
Design of a Role-Based Trust-Management Framework
We introduce the RT framework, a family of Rolebased Trust-management languages for representing policies and credentials in distributed authorization. RT combines the strengths o...
Ninghui Li, John C. Mitchell, William H. Winsborou...
CRYPTO
1993
Springer
137views Cryptology» more  CRYPTO 1993»
15 years 8 months ago
Broadcast Encryption
A broadcast encryption scheme allows the sender to securely distribute data to a dynamically changing set of users over an insecure channel. One of the most challenging settings fo...
Amos Fiat, Moni Naor
TPDS
1998
95views more  TPDS 1998»
15 years 3 months ago
Bound Performance Models of Heterogeneous Parallel Processing Systems
- Systems of heterogeneous parallel processing are studied such as arising in parallel programs executed on distributed systems. A lower and an upper bound model are suggested to o...
Simonetta Balsamo, Lorenzo Donatiello, Nico M. van...