Sciweavers

41 search results - page 7 / 9
» Rights Protection for Digital Contents Redistribution Over t...
Sort
View
ASIACRYPT
2003
Springer
14 years 24 days ago
A Traceable Block Cipher
In this paper1 we propose a new symmetric block cipher with the following paradoxical traceability properties: it is computationally easy to derive many equivalent secret keys prov...
Olivier Billet, Henri Gilbert
TIP
2010
107views more  TIP 2010»
13 years 2 months ago
Risk-Distortion Analysis for Video Collusion Attacks: A Mouse-and-Cat Game
Copyright protection is a key issue for video sharing over public networks. To protect the video content from unauthorized redistribution, digital fingerprinting is commonly used. ...
Yan Chen, W. Sabrina Lin, K. J. Ray Liu
CCS
2006
ACM
13 years 11 months ago
Hot or not: revealing hidden services by their clock skew
Location-hidden services, as offered by anonymity systems such as Tor, allow servers to be operated under a pseudonym. As Tor is an overlay network, servers hosting hidden service...
Steven J. Murdoch
IE
2007
13 years 9 months ago
Sam Fisher versus Immanuel Kant: the ethics of interactive media
This paper explores the notion of ethical engagement in interactive media through an examination of the Splinter Cell series of games. Keywords Interactive Media, Ethics, Stealth ...
Scott Beattie
MMM
2007
Springer
128views Multimedia» more  MMM 2007»
14 years 1 months ago
Video Histogram: A Novel Video Signature for Efficient Web Video Duplicate Detection
The explosive growth of information technology and digital content industry stimulates various video applications over the Internet. Since it is quite easy to copy, reformat, modif...
Lu Liu, Wei Lai, Xian-Sheng Hua, Shi-Qiang Yang