Speaker identification might be a suitable answer to prevent unauthorized access to personal data. However we also need to provide solutions to secure transmission of spoken infor...
Qin Jin, Arthur R. Toth, Tanja Schultz, Alan W. Bl...
The existence of on-line social networks that include person specific information creates interesting opportunities for various applications ranging from marketing to community o...
Barbara Carminati, Elena Ferrari, Raymond Heatherl...
The recent attack on Apple iTunes Digital Rights Management [17] has brought to light the usefulness of proxy re-encryption schemes for Digital Rights Management. It is known that...
The trend of Next Generation Networks' (NGN) evolution is towards providing multiple and multimedia services to users through ubiquitous networks. The aim of IP Multimedia Sub...