Sciweavers

1381 search results - page 265 / 277
» Trusted Computing: Providing Security for Peer-to-Peer Netwo...
Sort
View
DRM
2004
Springer
15 years 4 months ago
DRM as a layered system
The current landscape for digital rights management (DRM) consists of various ad hoc technologies and platforms that largely focus on copy protection. The fragmented nature of the...
Pramod A. Jamkhedkar, Gregory L. Heileman
68
Voted
MIDDLEWARE
2004
Springer
15 years 3 months ago
PoliPer: policies for mobile and pervasive environments
The need for sharing is well known in a large number of distributed applications. These applications are difficult to develop either for fully wired or mobile wireless networks. ...
Luís Veiga, Paulo Ferreira
DIM
2005
ACM
15 years 15 days ago
Pseudonym management using mediated identity-based cryptography
Mobile Location-Based Services (LBS) have raised privacy concerns amongst mobile phone users who may need to supply their identity and location information to untrustworthy third ...
Thibault Candebat, Cameron Ross Dunne, David T. Gr...
PERVASIVE
2004
Springer
15 years 3 months ago
eSeal - A System for Enhanced Electronic Assertion of Authenticity and Integrity
Ensuring authenticity and integrity are important tasks when dealing with goods. While in the past seal wax was used to ensure the integrity, electronic devices are now able to tak...
Christian Decker, Michael Beigl, Albert Krohn, Phi...
HPDC
2010
IEEE
14 years 11 months ago
A data transfer framework for large-scale science experiments
Modern scientific experiments can generate hundreds of gigabytes to terabytes or even petabytes of data that may furthermore be maintained in large numbers of relatively small fil...
Wantao Liu, Brian Tieman, Rajkumar Kettimuthu, Ian...