Sciweavers

4111 search results - page 264 / 823
» Security, Protocols, and Trust
Sort
View
59
Voted
IFIP
2010
Springer
14 years 7 months ago
AnBx - Security Protocols Design and Verification
Michele Bugliesi, Paolo Modesti
103
Voted
IFIP
2010
Springer
14 years 7 months ago
Security Analysis of the MPLS Label Distribution Protocol
Daniel Guernsey, Aaron Engel, Jonathan Butts, Suje...
64
Voted
JNCA
2010
85views more  JNCA 2010»
14 years 7 months ago
Adaptive security protocol selection for mobile computing
Bruno P. S. Rocha, Daniel N. O. Costa, Rande A. Mo...
40
Voted
ICASSP
2011
IEEE
14 years 4 months ago
Efficient protocols for secure adaptive filtering
Juan Ramón Troncoso-Pastoriza, Fernando P&e...
78
Voted
ISCC
2005
IEEE
15 years 6 months ago
Location Dependent Digital Rights Management
In this paper we present a concept and an architecture for a location dependent Digital Rights Management system. The solution is based on a trusted hardware which incorporates th...
Thomas Mundt