Sciweavers

3486 search results - page 633 / 698
» On the Design and Security of RC2
Sort
View
DRM
2006
Springer
15 years 2 months ago
Consumers, fans, and control: what the games industry can teach Hollywood about DRM
Through legislation and technology the film industry has been seeking to fully control usage of the bits it creates; their model is "restrictive" digital-rights manageme...
Susan Landau, Renée Stratulate, Doug Twille...
E4MAS
2006
Springer
15 years 2 months ago
Enhancing the Environment with a Law-Governed Service for Monitoring and Enforcing Behavior in Open Multi-Agent Systems
Environment is an essential part of any multi-agent system (MAS), since it provides the surrounding conditions for agents to exist. For some sort of systems, the environment can be...
Rodrigo B. de Paes, Gustavo R. de Carvalho, Ma&iac...
ECMDAFA
2006
Springer
136views Hardware» more  ECMDAFA 2006»
15 years 2 months ago
Finding a Path to Model Consistency
A core problem in Model Driven Engineering is model consistency achievement: all models must satisfy relationships constraining them. Active consistency techniques monitor and cont...
Gregory de Fombelle, Xavier Blanc, Laurent Rioux, ...
ESAS
2006
Springer
15 years 2 months ago
Impact of Pseudonym Changes on Geographic Routing in VANETs
Inter-vehicle communication is regarded as one of the major applications of mobile ad hoc networks (MANETs). In these so called vehicular ad hoc networks (VANETs) security and priv...
Elmar Schoch, Frank Kargl, Tim Leinmüller, St...
EUC
2006
Springer
15 years 2 months ago
A Scalable and Untraceable Authentication Protocol for RFID
RFID(Radio Frequency Identification) is recently becoming popular, promising and widespread. In contrast, RFID tags can bring about traceability that causes user privacy and reduce...
Youngjoon Seo, Hyunrok Lee, Kwangjo Kim