Sciweavers

259 search results - page 12 / 52
» Study of management on the mobile public key infrastructure
Sort
View
PDCN
2007
14 years 11 months ago
An information service infrastructure for ambient networks
Communication environments are becoming increasingly more complex due to the diversity of available network technologies in terms of spatial coverage and design characteristics, a...
Raffaele Giaffreda, Kostas Pentikousis, Eleanor He...
105
Voted
ACNS
2003
Springer
168views Cryptology» more  ACNS 2003»
15 years 2 months ago
PLI: A New Framework to Protect Digital Content for P2P Networks
In this paper, we first propose a novel Public License Infrastructure (PLI) that uses cryptographic threshold secret sharing schemes to provide decentralized public license service...
Guofei Gu, Bin B. Zhu, Shipeng Li, Shiyong Zhang
HICSS
2003
IEEE
126views Biometrics» more  HICSS 2003»
15 years 2 months ago
A Watermarking Infrastructure for Enterprise Document Management
Digital watermarking is a promising technology to embed copyright information as unperceivable signals in digital contents. Although various watermarking techniques have been empl...
Shing-Chi Cheung, Dickson K. W. Chiu
68
Voted
PERVASIVE
2006
Springer
14 years 9 months ago
Secure Mobile Computing Via Public Terminals
The rich interaction capabilities of public terminals can make them more convenient to use than small personal devices, such as smart phones. However, the use of public terminals t...
Richard Sharp, James Scott, Alastair R. Beresford
IPPS
2009
IEEE
15 years 4 months ago
Combating side-channel attacks using key management
Embedded devices are widely used in military and civilian operations. They are often unattended, publicly accessible, and thus vulnerable to physical capture. Tamper-resistant mod...
Donggang Liu, Qi Dong