Sciweavers

2234 search results - page 333 / 447
» Protocol Implementation Using Integrated Layer Processing
Sort
View
AFRICACRYPT
2010
Springer
15 years 8 months ago
Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices
The market for RFID technology has grown rapidly over the past few years. Going along with the proliferation of RFID technology is an increasing demand for secure and privacy-prese...
Marcel Medwed, François-Xavier Standaert, J...
ICDCS
2008
IEEE
15 years 8 months ago
Crystal: An Emulation Framework for Practical Peer-to-Peer Multimedia Streaming Systems
To rapidly evolve new designs of peer-to-peer (P2P) multimedia streaming systems, it is highly desirable to test and troubleshoot them in a controlled and repeatable experimental ...
Mea Wang, Hassan Shojania, Baochun Li
ICNP
2006
IEEE
15 years 7 months ago
Vault: A Secure Binding Service
— Binding services are crucial building blocks in networks and networked applications. A binding service (e.g., the Domain Name System (DNS)) maps certain information, namely, bi...
Guor-Huar Lu, Changho Choi, Zhi-Li Zhang
ACNS
2006
Springer
86views Cryptology» more  ACNS 2006»
15 years 7 months ago
W3Bcrypt: Encryption as a Stylesheet
Abstract. While web-based communications (e.g., webmail or web chatrooms) are increasingly protected by transport-layer cryptographic mechanisms, such as the SSL/TLS protocol, ther...
Angelos Stavrou, Michael E. Locasto, Angelos D. Ke...
WISA
2004
Springer
15 years 6 months ago
License Protection with a Tamper-Resistant Token
Content protection mechanisms are intended to enforce the usage rights on the content. These usage rights are carried by a license. Sometimes, a license even carries the key that i...
Cheun Ngen Chong, Bin Ren, Jeroen Doumen, Sandro E...