Sciweavers

621 search results - page 83 / 125
» Security of Internet Location Management
Sort
View
ISI
2007
Springer
15 years 8 months ago
Visualization of Events in a Spatially and Multimedia Enriched Virtual Environment
—Semantic Event Tracker (SET) is a highly interactive visualization tool for tracking and associating activities (events) in a spatially and Multimedia Enriched Virtual Environme...
Leonidas Deligiannidis, Farshad Hakimpour, Amit P....
INFOCOM
2002
IEEE
15 years 7 months ago
SAVE: Source Address Validity Enforcement Protocol
Forcing all IP packets to carry correct source addresses can greatly help network security, attack tracing, and network problem debugging. However, due to asymmetries in toda...
Jun Li, Jelena Mirkovic, Mengqiu Wang, Peter L. Re...
DRM
2006
Springer
15 years 5 months ago
Consumers, fans, and control: what the games industry can teach Hollywood about DRM
Through legislation and technology the film industry has been seeking to fully control usage of the bits it creates; their model is "restrictive" digital-rights manageme...
Susan Landau, Renée Stratulate, Doug Twille...
WWW
2010
ACM
15 years 9 months ago
Object views: fine-grained sharing in browsers
Browsers do not currently support the secure sharing of JavaScript objects between principals. We present this problem as the need for object views, which are consistent and contr...
Leo A. Meyerovich, Adrienne Porter Felt, Mark S. M...
HT
2004
ACM
15 years 7 months ago
An anatomy of anchors
While much attention is paid to defining and examining interactions with links, little is paid to the front end: the anchor. We examine what an anchor is, describe six anchor prop...
Deena Larsen, Richard E. Higgason