Sciweavers

168 search results - page 11 / 34
» el 2010
Sort
View
EL
2002
134views more  EL 2002»
14 years 9 months ago
Security issues in online games
The traditional target of computer game security is mainly copy protection. The emergence of online games fundamentally changes the security requirements for computer games. Althou...
Jianxin Jeff Yan, Hyun-Jin Choi
FC
2010
Springer
180views Cryptology» more  FC 2010»
14 years 10 months ago
Lighten Encryption Schemes for Secure and Private RFID Systems
We provide several concrete implementations of a generic method given by Vaudenay to construct secure privacy-preserving RFID authentication and identification systems. More precis...
Sébastien Canard, Iwen Coisel, Jonathan Etr...
CORR
2010
Springer
78views Education» more  CORR 2010»
14 years 9 months ago
On an Outer bound and an Inner Bound for the General Broadcast Channel
In this paper, we study the Nair-El Gamal outer bound and Marton's inner bound for general two-receiver broadcast channels. We show that the Nair-El Gamal outer bound can be m...
Amin Aminzadeh Gohari, Abbas El Gamal, Venkat Anan...
EL
2006
131views more  EL 2006»
14 years 9 months ago
How digital libraries can support e-learning
Digital libraries offer opportunities for elearning that are not possible in their physical counterparts. Digital libraries complement other learning environments, such as those p...
Saeed Rezaei Sharifabadi
EL
2002
181views more  EL 2002»
14 years 9 months ago
Aspects of networking in multiplayer computer games
Distributed, real-time multiplayer computer games (MCGs) are in the vanguard of utilizing the networking possibilities. Although related research have been done in military simulat...
Jouni Smed, Timo Kaukoranta, Harri Hakonen