Sciweavers

2601 search results - page 125 / 521
» Secure Rewarding Schemes
Sort
View
TCS
2008
15 years 3 months ago
New constructions for provably-secure time-bound hierarchical key assignment schemes
A time-bound hierarchical key assignment scheme is a method to assign time-dependent encryption keys to a set of classes in a partially ordered hierarchy, in such a way that each ...
Alfredo De Santis, Anna Lisa Ferrara, Barbara Masu...
157
Voted
PERCOM
2007
ACM
16 years 2 months ago
SMOCK: A Self-Contained Public Key Management Scheme for Mission-Critical Wireless Ad Hoc Networks
Mobile ad hoc networks show great potential in emergency response and/or recovery. Such mission-critical applications demand security service be "anywhere", "anytim...
Wenbo He, Ying Huang, Klara Nahrstedt, Whay Chiou ...
WWIC
2007
Springer
156views Communications» more  WWIC 2007»
15 years 9 months ago
ID-Based Multiple Space Key Pre-distribution Scheme for Wireless Sensor Networks
Providing security services for wireless sensor networks plays a vital role in secure network operation especially when sensor networks are deployed in hostile areas. In order to p...
Tran Thanh Dai, Choong Seon Hong
PCM
2009
Springer
114views Multimedia» more  PCM 2009»
15 years 7 months ago
Improving a Digital Rights Management Scheme for Video Broadcast
The security of content distribution is a critical issue that all the content providers have to treat seriously in order to guarantee their business. Emmanuel and Kankanhalli propo...
Yongdong Wu, Feng Bao
WORM
2004
15 years 4 months ago
ACT: attachment chain tracing scheme for email virus detection and control
Modern society is highly dependent on the smooth and safe flow of information over communication and computer networks. Computer viruses and worms pose serious threats to the soci...
Jintao Xiong