Abstract. Proxy re-encryption (PRE) allows a semi-trusted proxy to convert a ciphertext originally intended for Alice into one encrypting the same plaintext for Bob. The proxy only...
Sherman S. M. Chow, Jian Weng, Yanjiang Yang, Robe...
Seamless integration of digital parts libraries or electronic parts catalogs for e-procurement is impeded by semantic heterogeneity. The utilization of ontologies as metadata desc...
Digital videos are increasingly adopted in various multimedia applications where they are usually broadcasted or transmitted as video streams. Continuously monitoring copies on the...
Abstract. We introduce a new technique for extracting unique fingerprints from identical CDs. The proposed technique takes advantage of manufacturing variability found in the lengt...
Trusted computing (e.g. TCPA and Microsoft’s NextGeneration Secure Computing Base) has been one of the most talked about and least understood technologies in the computing commu...