Through legislation and technology the film industry has been seeking to fully control usage of the bits it creates; their model is "restrictive" digital-rights manageme...
Network attacks have become the fundamental threat to today's largely interconnected computer systems. Unauthorized activities and unauthorized access account for a large pro...
In today’s computing environment, unauthorized accesses and misuse of critical data can be catastrophic to personal users, businesses, emergency services, and even national defe...
Jianfeng Peng, Chuan Feng, Haiyan Qiao, Jerzy W. R...
The secure release of identity attributes is a key enabler for electronic business interactions. In particular, integrity and confidentiality of identity attributes are two key re...
Federica Paci, David Bauer, Elisa Bertino, Douglas...
The widespread use of mobile devices brings opportunities to capture large-scale, continuous information about human behavior. Mobile data has tremendous value, leading to busines...