: Group key management has received a particular attention, these last years, in both academic and industry research communities. This is due to the economical relevance of group-b...
Yacine Challal, Said Gharout, Abdelmadjid Bouabdal...
A protocol for assuring the authenticity of information broadcasted over long periods of time is proposed. The protocol is based on time synchronization and uses one-way chains con...
In this work we propose a novel type of digital video encryption that has several advantages over other currently available digital video encryption schemes. We also present an ex...
Daniel Socek, Hari Kalva, Spyros S. Magliveras, Og...
—With increasing amount of sensitive user data stored in social computing systems (SCSs) and lack of consensus on how it should be protected under meaningful control by the avera...
Recent enhancements in location technologies reliability and precision are fostering the development of a new wave of applications that make use of the location information of user...
Claudio Agostino Ardagna, Marco Cremonini, Sabrina...