Sciweavers

427 search results - page 75 / 86
» Digital rights management using a mobile phone
Sort
View
AFRICACRYPT
2010
Springer
13 years 11 months ago
Efficient Unidirectional Proxy Re-Encryption
Abstract. Proxy re-encryption (PRE) allows a semi-trusted proxy to convert a ciphertext originally intended for Alice into one encrypting the same plaintext for Bob. The proxy only...
Sherman S. M. Chow, Jian Weng, Yanjiang Yang, Robe...
CAD
2006
Springer
13 years 7 months ago
Meta-ontology for automated information integration of parts libraries
Seamless integration of digital parts libraries or electronic parts catalogs for e-procurement is impeded by semantic heterogeneity. The utilization of ontologies as metadata desc...
Joonmyun Cho, Soonhung Han, Hyun Kim
ICDE
2008
IEEE
232views Database» more  ICDE 2008»
14 years 9 months ago
Continuous Content-Based Copy Detection over Streaming Videos
Digital videos are increasingly adopted in various multimedia applications where they are usually broadcasted or transmitted as video streams. Continuously monitoring copies on the...
Ying Yan, Beng Chin Ooi, Aoying Zhou
CHES
2009
Springer
192views Cryptology» more  CHES 2009»
14 years 8 months ago
CDs Have Fingerprints Too
Abstract. We introduce a new technique for extracting unique fingerprints from identical CDs. The proposed technique takes advantage of manufacturing variability found in the lengt...
Ghaith Hammouri, Aykutlu Dana, Berk Sunar
HOTOS
2003
IEEE
14 years 1 months ago
Flexible OS Support and Applications for Trusted Computing
Trusted computing (e.g. TCPA and Microsoft’s NextGeneration Secure Computing Base) has been one of the most talked about and least understood technologies in the computing commu...
Tal Garfinkel, Mendel Rosenblum, Dan Boneh