Sciweavers

18 search results - page 2 / 4
» Location Dependent Digital Rights Management
Sort
View
PODS
2004
ACM
158views Database» more  PODS 2004»
14 years 5 months ago
Composing Schema Mappings: Second-Order Dependencies to the Rescue
A schema mapping is a specification that describes how data structured under one schema (the source schema) is to be transformed into data structured under a different schema (the...
Ronald Fagin, Phokion G. Kolaitis, Lucian Popa, Wa...
DAC
2010
ACM
13 years 9 months ago
Quality metric evaluation of a physical unclonable function derived from an IC's power distribution system
The level of security provided by digital rights management functions and cryptographic protocols depend heavily on the security of an embedded secret key. The current practice of...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic
DIM
2005
ACM
13 years 7 months ago
Pseudonym management using mediated identity-based cryptography
Mobile Location-Based Services (LBS) have raised privacy concerns amongst mobile phone users who may need to supply their identity and location information to untrustworthy third ...
Thibault Candebat, Cameron Ross Dunne, David T. Gr...
CRYPTO
2007
Springer
106views Cryptology» more  CRYPTO 2007»
13 years 11 months ago
Information Security Economics - and Beyond
The economics of information security has recently become a thriving and fast-moving discipline. As distributed systems are assembled from machines belonging to principals with div...
Ross Anderson, Tyler Moore
SIGUCCS
2000
ACM
13 years 10 months ago
New Economy, New Partnership: New DocShare
DocShare, born at SIGUCCS User Services ’95, has gone one step further in its evolution to take advantage of the new digital economy and partnership opportunity. DocShare is a c...
Keiko Pitter, Gil Gonzales, Marian Smith