Sciweavers

143 search results - page 4 / 29
» Enabling secure digital marketplace
Sort
View
ACMICEC
2007
ACM
163views ECommerce» more  ACMICEC 2007»
13 years 11 months ago
Digital rights management using a mobile phone
This paper focuses on the problem of preventing illegal copying of digital assets without jeopardising the right of legitimate licence holders to transfer content between their ow...
Imad M. Abbadi, Chris J. Mitchell
ESORICS
2012
Springer
11 years 9 months ago
Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System
Abstract. Given the requirements of fast processing and the complexity of RF ranging systems, distance bounding protocols have been challenging to implement so far; only few design...
Aanjhan Ranganathan, Nils Ole Tippenhauer, Boris S...
JAR
2008
115views more  JAR 2008»
13 years 7 months ago
Formal Models and Analysis of Secure Multicast in Wired and Wireless Networks
The spreading of multicast technology enables the development of group communication and so dealing with digital streams becomes more and more common over the Internet. Given the f...
Roberto Gorrieri, Fabio Martinelli, Marinella Petr...
DIM
2005
ACM
13 years 9 months ago
Establishing and protecting digital identity in federation systems
We develop solutions for the security and privacy of user identity information in a federation. By federation we mean a group of organizations or service providers which have buil...
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...
CIDR
2009
113views Algorithms» more  CIDR 2009»
13 years 8 months ago
Remembrance: The Unbearable Sentience of Being Digital
We introduce a world vision in which data is endowed with memory. In this data-centric systems paradigm, data items can be enabled to retain all or some of their previous values. ...
Ragib Hasan, Radu Sion, Marianne Winslett