Sciweavers

3047 search results - page 503 / 610
» A Secure Distributed Search System
Sort
View
DRM
2005
Springer
15 years 4 months ago
Fairer usage contracts for DRM
DRM has been widely promoted as a means to enforce copyright. In many previous papers, it has been argued that DRM gives too much power to rights holders and actually goes beyond ...
Alapan Arnab, Andrew Hutchison
FC
2005
Springer
87views Cryptology» more  FC 2005»
15 years 4 months ago
Protecting Secret Data from Insider Attacks
We consider defenses against confidentiality and integrity attacks on data following break-ins, or so-called intrusion resistant storage technologies. We investigate the problem o...
David Dagon, Wenke Lee, Richard J. Lipton
OOPSLA
2004
Springer
15 years 4 months ago
Converting Java classes to use generics
Generics offer significant software engineering benefits since they provide code reuse without compromising type safety. Thus generics will be added to the Java language in the...
Daniel von Dincklage, Amer Diwan
ICASSP
2009
IEEE
15 years 6 months ago
Time-sensitive behavior dynamics in multimedia fingerprinting social networks
Multimedia social network is a network infrastructure in which the social network members share multimedia contents with all different purposes. Analyzing user behavior in multime...
W. Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu
GLOBECOM
2007
IEEE
15 years 5 months ago
A Hash Function Scheme for Key Management in UMTS MBMS
—3GPP 33.246 proposes Key Management Mechanism (KMM) to distribute security keys for Universal Mobile Telecommunications System (UMTS) Multimedia Broadcast and Multicast Service ...
Shin-Ming Cheng, Wei-Ru Lai, Phone Lin