Sciweavers

963 search results - page 80 / 193
» Conditional Digital Signatures
Sort
View
FDG
2009
ACM
14 years 4 months ago
Emphasizing soft skills and team development in an educational digital game design course
Engineering education has evolved from providing students solely with technical skills to providing them with courses that provide students with the non-technical “soft skillsâ€...
Quincy Brown, Frank J. Lee, Suzanne Alejandre
TABLETOP
2007
IEEE
14 years 4 months ago
Reading Revisited: Evaluating the Usability of Digital Display Surfaces for Active Reading Tasks
A number of studies have shown that paper holds several advantages over computers for reading tasks. However, these studies were carried out several years ago, and since that time...
Meredith Ringel Morris, A. J. Bernheim Brush, Bria...
PET
2007
Springer
14 years 4 months ago
Enforcing P3P Policies Using a Digital Rights Management System
The protection of privacy has gained considerable attention recently. In response to this, new privacy protection systems are being introduced. SITDRM is one such system that prote...
Farzad Salim, Nicholas Paul Sheppard, Reihaneh Saf...
APNOMS
2006
Springer
14 years 1 months ago
A Novel Rekey Management Scheme in Digital Broadcasting Network
Conditional Access System (CAS) performs entitlement management to make only legitimate subscribers watch pay-services. Generally, CAS uses passive entitlement management to fulfil...
Han-Seung Koo, Il-Kyoo Lee, Jae-Myung Kim, Sung-Wo...
DBSEC
2010
196views Database» more  DBSEC 2010»
13 years 6 months ago
Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance
Abstract. This paper describes how to preserve integrity and confidentiality of a directed acyclic graph (DAG) model of provenance database. We show a method to preserve integrity ...
Amril Syalim, Takashi Nishide, Kouichi Sakurai