Abstract. Malicious Web content poses a serious threat to the Internet, organizations and users. Current approaches to detecting malicious Web content employ high-powered honey cli...
For many data providers, the “crown jewels” of their business are the data that they have organized. If someone could copy their entire database, it would be a competitive cata...
Magesh Jayapandian, Brian D. Noble, James W. Micke...
This paper describes two protocols for the secure download of content protection software to mobile devices. The protocols apply concepts from trusted computing to demonstrate tha...
Statistical database protection is a part of information security which tries to prevent published statistical information (tables, individual records) from disclosing the contrib...
In the last few years, live pay-TV system via internet has come to be established with the development of broadband network. To develop such a system, a mechanism for content prote...