Sciweavers

507 search results - page 81 / 102
» The XTR Public Key System
Sort
View
ISM
2006
IEEE
95views Multimedia» more  ISM 2006»
15 years 3 months ago
Digital Rights Management for Video Sensor Network
Video sensor network is evolving from an isolated system to an integral component of the global information infrastructure. In this paper, we argue that when video sensor network ...
Taojun Wu, Liang Dai, Yuan Xue, Yi Cui
64
Voted
ITCC
2005
IEEE
15 years 3 months ago
CompChall: Addressing Password Guessing Attacks
Even though passwords are the most convenient means of authentication, they bring along themselves the threat of dictionary attacks. Dictionary attacks may be of two kinds: online...
Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith A...
IFIP
2005
Springer
15 years 3 months ago
A Logic for Analysing Subterfuge in Delegation Chains
Abstract. Trust Management is an approach to construct and interpret the trust relationships among public-keys that are used to mediate security-critical actions. Cryptographic cre...
Hongbin Zhou, Simon N. Foley
PDCAT
2005
Springer
15 years 3 months ago
Trusted Computing-Based Security Architecture For 4G Mobile Networks
In this paper security requirements and security architecture for 4G systems are presented with the consideration of Trusted Computing (TC) for mobile equipment (ME). The security...
Yu Zheng, Dake He, Weichi Yu, Xiaohu Tang
104
Voted
HICSS
2002
IEEE
139views Biometrics» more  HICSS 2002»
15 years 2 months ago
Examining Quality of Care -- How Poor Information Flow Can Impact on Hospital Workflow and Affect Patient Outcomes
This paper argues that effective management of patient image data can enhance patient care. It examines the workflow and information flows involved in the search for image based d...
Reeva M. Lederman, Iain Morrison