In CRYPTO 1997, Canetti et al.put forward the intruiging notion of deniable encryption, which (informally) allows a sender and/or receiver, having already performed some encrypted...
Power dissipation has become one of the most critical factors for the continued development of both high-end and low-end computer systems. The successful design and evaluation of ...
Sudhanva Gurumurthi, Anand Sivasubramaniam, Mary J...
Digital watermarking is a promising technology to embed copyright information as unperceivable signals in digital contents. Although various watermarking techniques have been empl...
Web services security specifications are typically expressed as a mixture of XML schemas, example messages, and narrative explanations. We propose a new specification language fo...
Two main Rights Expression Languages (RELs) exist to describe licenses governing the access to digital content: ODRL (Open Digital Rights Language) and MPEG-21 REL. Both RELs are ...