Sciweavers

947 search results - page 12 / 190
» Information Security in Mobile Databases
Sort
View
DEXAW
2005
IEEE
164views Database» more  DEXAW 2005»
14 years 1 months ago
Mobile Digital Rights Management: Security Requirements and Copy Detection Mechanisms
This paper addresses the specification of security modules in a Mobile Digital Rights Management (DRM) approach with a focus on copy detection mechanisms. The presented DRM approa...
Miguel Soriano, Stephan Flake, Jürgen Tacken,...
ICALP
2005
Springer
14 years 28 days ago
Single-Database Private Information Retrieval with Constant Communication Rate
We present a single-database private information retrieval (PIR) scheme with communication complexity O(k+d), where k ≥ log n is a security parameter that depends on the database...
Craig Gentry, Zulfikar Ramzan
ESORICS
1994
Springer
13 years 11 months ago
Aggregation in Relational Databases: Controlled Disclosure of Sensitive Information
It has been observed that often the release of a limited part of an information resource poses no security risks, but the relase of a sufficiently large part of that resource might...
Amihai Motro, Donald G. Marks, Sushil Jajodia
DEXAW
2002
IEEE
138views Database» more  DEXAW 2002»
14 years 11 days ago
Middleware for Mobile Information Access
Mobile information access involves retrieving information from wired service providers. Often there are situations where the information is not available from a single service pro...
Dipanjan Chakraborty, Filip Perich, Anupam Joshi, ...
ICEB
2004
297views Business» more  ICEB 2004»
13 years 8 months ago
Security Measures in Mobile Commerce: Problems and Solutions
Due to the advent of the Internet, electronic business transactions have exploded around the globe. Along with the Internet, wireless technology has exponentially developed as wel...
Sanwar Ali, Waleed Farag, Mohammad A. Rob