In this paper, we present our experiences concerning the enforcement of access rights extracted from ODRL-based digital contracts. We introduce the generalized Contract Schema (Co...
Abstract. In this paper, we propose a novel solution called joint encryption, in which audio and video data are scrambled efficiently by using modified phase scrambling, modified...
Goo-Rak Kwon, Tea-Young Lee, Kyoung-Ho Kim, Jae-Do...
In this paper, I describe an ethnographic study of children and parents looking at issues of domestic privacy and security. I will provide an overview of parental rules and strate...
Composition theorems in simulation-based approaches allow to build complex protocols from sub-protocols in a modular way. However, as first pointed out and studied by Canetti and ...
Information security and privacy in the healthcare sector is an issue of growing importance. The adoption of digital patient records, increased regulation, provider consolidation,...