Sciweavers

1757 search results - page 145 / 352
» Secure Content Validation
Sort
View
CASES
2005
ACM
15 years 1 months ago
SECA: security-enhanced communication architecture
In this work, we propose and investigate the idea of enhancing a System-on-Chip (SoC) communication architecture (the fabric that integrates system components and carries the comm...
Joel Coburn, Srivaths Ravi, Anand Raghunathan, Sri...
ICMCS
2005
IEEE
88views Multimedia» more  ICMCS 2005»
15 years 5 months ago
Hash-based Counter Scheme for Digital Rights Management
This paper describes a counter scheme that uses hash functions to count how many times the user is allowed to play protected content in a DRM-enabled player. The proposed basic sc...
Mikko Löytynoja, Tapio Seppänen
ISRR
2005
Springer
105views Robotics» more  ISRR 2005»
15 years 5 months ago
Networked Robotic Cameras for Collaborative Observation of Natural Environments
Many viewers simultaneously observe events in a common, but remote, environment in applications ranging from scientific observation, journalism, distance education, security, and...
Dezhen Song, Kenneth Y. Goldberg
MMSEC
2004
ACM
104views Multimedia» more  MMSEC 2004»
15 years 5 months ago
Key-assignment strategies for CPPM
CSS, the first system to protect multimedia content on the new DVD medium failed badly, because both its encryption algorithm and its key management could easily be broken. A new ...
André Adelsbach, Jörg Schwenk
CF
2008
ACM
15 years 1 months ago
Exact multi-pattern string matching on the cell/b.e. processor
String searching is the computationally intensive kernel of many security and network applications like search engines, intrusion detection systems, virus scanners and spam filter...
Daniele Paolo Scarpazza, Oreste Villa, Fabrizio Pe...