Sciweavers

2354 search results - page 19 / 471
» DRM as a layered system
Sort
View
IJNSEC
2011
143views more  IJNSEC 2011»
13 years 2 months ago
Probable Security Proof of A Blind Signature Scheme over Braid Groups
In this paper, we reinvestigate the security analysis of blind signature scheme over braid groups proposed by Verma in 2008. A blind signature scheme is a cryptographic primitive ...
Girraj Kumar Verma
DATE
2005
IEEE
102views Hardware» more  DATE 2005»
14 years 1 months ago
Modeling of a Reconfigurable OFDM IP Block Family For an RF System Simulator
The idea of design domain specific Mother Model of IP block family as a base of modeling of system integration is presented here. A common reconfigurable Mother Model for ten diff...
Hannu Heusala, Jussi Liedes
CSSE
2008
IEEE
14 years 2 months ago
A Study of E-learning Architecture Based on Knowledge Innovation
—This paper reveals weaknesses of existing e-learning system and puts forward a novel architecture of five layers from the perspective of knowledge innovation. Learner interface ...
Qinglong Zhan, Chengyang Chang
DRM
2003
Springer
14 years 23 days ago
Experiences with the enforcement of access rights extracted from ODRL-based digital contracts
In this paper, we present our experiences concerning the enforcement of access rights extracted from ODRL-based digital contracts. We introduce the generalized Contract Schema (Co...
Susanne Guth, Gustaf Neumann, Mark Strembeck
ICDAR
1995
IEEE
13 years 11 months ago
A map acquisition, storage, indexing, and retrieval system
A system for the acquisition, storage, indexing, and retrieval of map images is presented. The input to this system are raster images of separate map layers and map composites. A ...
Hanan Samet, Aya Soffer