Encryption is widely used to enforce usage rules for digital content. In many scenarios content is encrypted using a group key which is known to a group of users that are allowed ...
Background: A survey of microarray databases reveals that most of the repository contents and data models are heterogeneous (i.e., data obtained from different chip manufacturers)...
Todd H. Stokes, J. T. Torrance, Henry Li, May D. W...
We improve a secret sharing scheme, which enables users select their personal keys by themselves instead of being distributed by group manager and users can reuse their personal k...
The ability to utilize and benefit from today's explosion of social media sites depends on providing tools that allow users to productively participate. In order to participa...
Marc Smith, Vladimir Barash, Lise Getoor, Hady Wir...
Today, people use multiple devices to fulfill their information needs. However, designers design each device individually, without accounting for the other devices that users may ...