Sciweavers

6844 search results - page 1109 / 1369
» Web Service Security
Sort
View
MOBIQUITOUS
2005
IEEE
15 years 10 months ago
A SIP-based Architecture model for Contextual Coalition Access Control for Ubiquitous Computing
A significant deterrent to the ability to connect in a spontaneous manner in cross-enterprise collaborative applications is the difficulty in users from different domains being ab...
Ramiro Liscano, Kaining Wang
SAINT
2005
IEEE
15 years 10 months ago
A Case Study in Running a Parallel Branch and Bound Application on the Grid
This paper presents a case study to effectively run a parallel branch and bound application on the Grid. The application discussed in this paper is a fine-grain application and is...
Kento Aida, Tomotaka Osumi
SIGCOMM
2005
ACM
15 years 10 months ago
Policing congestion response in an internetwork using re-feedback
This paper introduces a novel feedback arrangement, termed re-feedback. It ensures metrics in data headers such as time to live and congestion notification will arrive at each re...
Bob Briscoe, Arnaud Jacquet, Carla Di Cairano-Gilf...
CHES
2005
Springer
149views Cryptology» more  CHES 2005»
15 years 10 months ago
Resistance of Randomized Projective Coordinates Against Power Analysis
Embedded devices implementing cryptographic services are the result of a trade-off between cost, performance and security. Aside from flaws in the protocols and the algorithms us...
William Dupuy, Sébastien Kunz-Jacques
MMSEC
2004
ACM
209views Multimedia» more  MMSEC 2004»
15 years 10 months ago
Robust DWT-SVD domain image watermarking: embedding data in all frequencies
Protection of digital multimedia content has become an increasingly important issue for content owners and service providers. As watermarking is identified as a major technology t...
Emir Ganic, Ahmet M. Eskicioglu
« Prev « First page 1109 / 1369 Last » Next »