Sciweavers

5184 search results - page 138 / 1037
» The digital divide of computing
Sort
View
141
Voted
DRM
2003
Springer
15 years 9 months ago
Digital rights management in a 3G mobile phone and beyond
In this paper we examine how copyright protection of digital items can be securely managed in a 3G mobile phone and other devices. First, the basic concepts, strategies, and requi...
Thomas S. Messerges, Ezzat A. Dabbish
ASIACRYPT
2000
Springer
15 years 8 months ago
Unconditionally Secure Digital Signature Schemes Admitting Transferability
A potentially serious problem with current digital signature schemes is that their underlying hard problems from number theory may be solved by an innovative technique or a new gen...
Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hi...
CG
2006
Springer
15 years 4 months ago
Connectivity preserving digitization of blurred binary images in 2D and 3D
Connectivity and neighborhood are fundamental topological properties of objects in pictures. Since the input for any image analysis algorithm is a digital image, which does not ne...
Peer Stelldinger, Ullrich Köthe
AUSAI
2001
Springer
15 years 9 months ago
A Semiotic Model of Communication and Its Implications for the Digital City Development
This study attempts to find a theoretical basis for the development of digital cities. The ultimate function of a digital city is to support navigation in an environment. Navigatio...
Victor V. Kryssanov, Masayuki Okabe, Koh Kakusho, ...
CRYPTO
1990
Springer
78views Cryptology» more  CRYPTO 1990»
15 years 8 months ago
How to Time-Stamp a Digital Document
The prospect of a world in which all text, audio, picture, and video documents are in digital form on easily modi able media raises the issue of how to certify when a document was...
Stuart Haber, W. Scott Stornetta