Sciweavers

729 search results - page 86 / 146
» Towards Secure e-Services
Sort
View
ICALP
2010
Springer
13 years 11 months ago
From Secrecy to Soundness: Efficient Verification via Secure Computation
d Abstract) Benny Applebaum1 , Yuval Ishai2 , and Eyal Kushilevitz3 1 Computer Science Department, Weizmann Institute of Science 2 Computer Science Department, Technion and UCLA 3 ...
Benny Applebaum, Yuval Ishai, Eyal Kushilevitz
ICASSP
2009
IEEE
14 years 3 months ago
Voice convergin: Speaker de-identification by voice transformation
Speaker identification might be a suitable answer to prevent unauthorized access to personal data. However we also need to provide solutions to secure transmission of spoken infor...
Qin Jin, Arthur R. Toth, Tanja Schultz, Alan W. Bl...
SACMAT
2009
ACM
14 years 3 months ago
A semantic web based framework for social network access control
The existence of on-line social networks that include person specific information creates interesting opportunities for various applications ranging from marketing to community o...
Barbara Carminati, Elena Ferrari, Raymond Heatherl...
DRM
2008
Springer
13 years 11 months ago
RSA-TBOS signcryption with proxy re-encryption
The recent attack on Apple iTunes Digital Rights Management [17] has brought to light the usefulness of proxy re-encryption schemes for Digital Rights Management. It is known that...
Varad Kirtane, C. Pandu Rangan
JIPS
2010
462views more  JIPS 2010»
13 years 4 months ago
Challenges to Next Generation Services in IP Multimedia Subsystem
The trend of Next Generation Networks' (NGN) evolution is towards providing multiple and multimedia services to users through ubiquitous networks. The aim of IP Multimedia Sub...
Kai-Di Chang, Chi-Yuan Chen, Jiann-Liang Chen, Han...