Sciweavers

6907 search results - page 241 / 1382
» Securing distributed adaptation
Sort
View
ICASSP
2011
IEEE
14 years 8 months ago
Informed secure watermarking using optimal transport
This paper presents several watermarking methods preventing the estimation of the secret key by an adversary. The constraints for secure embedding using distribution matching, whe...
Patrick Bas
MOBIQUITOUS
2008
IEEE
15 years 10 months ago
A secure middleware for wireless sensor networks
SMEPP Light is a middleware for Wireless Sensor Networks (WSNs) based on mote-class sensors. It is derived from the specification developed under the framework of the SMEPP proje...
Claudio Vairo, Michele Albano, Stefano Chessa
ASIACRYPT
2001
Springer
15 years 8 months ago
Provably Secure Fair Blind Signatures with Tight Revocation
A fair blind signature scheme allows the trustee to revoke blindness so that it provides authenticity and anonymity to honest users while preventing malicious users from abusing th...
Masayuki Abe, Miyako Ohkubo
WCE
2007
15 years 5 months ago
Secure Multicarrier Modem on FPGA
— The paper deals with the design and realization of a secure multicarrier modem on FPGA. The crypto-modem principle is adopted. An encryption block is integrated in the modem tr...
Galia Marinova, Vassil Guliashki, Didier Le Ruyet,...
PERCOM
2009
ACM
15 years 11 months ago
A Middleware Service for Coordinated Adaptation of Communication Services in Groups of Devices
—Recent research in pervasive computing has shown that context-awareness and dynamic adaptation are fundamental requirements of mobile distributed applications. However, most app...
Jordan Janeiro, Thomas Springer, Markus Endler