Sciweavers

1251 search results - page 226 / 251
» On the security of group communication schemes
Sort
View
MMSEC
2006
ACM
195views Multimedia» more  MMSEC 2006»
15 years 7 months ago
Image annotation watermarking: nested object embedding using hypergraph model
In this paper, we introduce to the special domain of image annotation watermarking, based on embedding of hierarchical data related to objects into user-selected areas on an image...
Claus Vielhauer, Maik Schott
148
Voted
ACISICIS
2008
IEEE
15 years 8 months ago
SIMPA: A SIP-Based Mobile Payment Architecture
In recent years, many Mobile Payment (MP) schemes have been proposed and used in practise. However, a prerequisite for extended acceptance and adoption of MP technologies is to de...
Ge Zhang, Feng Cheng 0002, Christoph Meinel
HUC
2007
Springer
15 years 8 months ago
Privacy Enhancing Technologies for RFID in Retail- An Empirical Investigation
This article investigates the conflicting area of user benefits arising through item level RFID tagging and a desire for privacy. It distinguishes between three approaches feasible...
Sarah Spiekermann
89
Voted
GLOBECOM
2006
IEEE
15 years 8 months ago
Scalable Hierarchical Traceback
—Distributed Denial of Service attacks have recently emerged as one of the most potent, if not the greatest, weaknesses of the Internet. Previous solutions for this problem try t...
Arjan Durresi, Vamsi Paruchuri
105
Voted
SIGECOM
2005
ACM
130views ECommerce» more  SIGECOM 2005»
15 years 7 months ago
Graceful service degradation (or, how to know your payment is late)
When distributing digital content over a broadcast channel it’s often necessary to revoke users whose access privileges have expired, thus preventing them from recovering the co...
Alexandr Andoni, Jessica Staddon