In a broadcast encryption scheme, digital content is encrypted to ensure that only privileged users can recover the content from the encrypted broadcast. Key material is usually he...
Abstract. The deployment of Share Data Spaces in open, possibly hostile, environments arises the need of protecting the confidentiality of the data space content. Existing approach...
Giovanni Russello, Changyu Dong, Naranker Dulay, M...
This paper presents an authentication scheme and an access control scheme for JPEG2000 image codestreams based on hash chains. Both schemes are fully compatible with the core part...
Abstract. In this paper we extend the notion of hierarchical identitybased encryption with wildcards (WIBE) from the domain of a single Trusted Authority (TA) to a setting with mul...
Kent D. Boklan, Alexander W. Dent, Christopher A. ...
In visual cryptography, the secret can be any written text, graphical representation, or picture. This technique, some time called visual secret sharing (VSS), allows visual infor...