Sciweavers

360 search results - page 68 / 72
» The design of integrating subliminal channel with access con...
Sort
View
CCS
2008
ACM
15 years 2 months ago
Flexible and secure enterprise rights management based on trusted virtual domains
The requirements for secure document workflows in enterprises become increasingly sophisticated, with employees performing different tasks under different roles using the same pro...
Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, ...
109
Voted
MSWIM
2003
ACM
15 years 5 months ago
Markov-based modeling of wireless local area networks
Errors introduced by a wireless medium are more frequent and profound than contemporary wired media. Some of these errors, which are not corrected by the physical layer, result in...
Syed A. Khayam, Hayder Radha
131
Voted
CF
2004
ACM
15 years 6 months ago
An architectural framework and a middleware for cooperating smart components
In a future networked physical world, a myriad of smart sensors and actuators assess and control aspects of their environments and autonomously act in response to it. Examples ran...
Antonio Casimiro, Jörg Kaiser, Paulo Ver&iacu...
ACSAC
2010
IEEE
14 years 10 months ago
FIRM: capability-based inline mediation of Flash behaviors
The wide use of Flash technologies makes the security risks posed by Flash content an increasingly serious issue. Such risks cannot be effectively addressed by the Flash player, w...
Zhou Li, XiaoFeng Wang
JSAC
2006
155views more  JSAC 2006»
15 years 14 days ago
Cross-Layer Optimized Video Streaming Over Wireless Multihop Mesh Networks
Abstract--The proliferation of wireless multihop communication infrastructures in office or residential environments depends on their ability to support a variety of emerging appli...
Yiannis Andreopoulos, Nicholas Mastronarde, Mihael...