This paper addresses the specification of security modules in a Mobile Digital Rights Management (DRM) approach with a focus on copy detection mechanisms. The presented DRM approa...
We present a single-database private information retrieval (PIR) scheme with communication complexity O(k+d), where k ≥ log n is a security parameter that depends on the database...
It has been observed that often the release of a limited part of an information resource poses no security risks, but the relase of a sufficiently large part of that resource might...
Mobile information access involves retrieving information from wired service providers. Often there are situations where the information is not available from a single service pro...
Dipanjan Chakraborty, Filip Perich, Anupam Joshi, ...
Due to the advent of the Internet, electronic business transactions have exploded around the globe. Along with the Internet, wireless technology has exponentially developed as wel...