Sciweavers

1045 search results - page 16 / 209
» On the Security of Digital Tachographs
Sort
View
PROVSEC
2010
Springer
14 years 9 months ago
Efficient Confirmer Signatures from the "Signature of a Commitment" Paradigm
Generic constructions of designated confirmer signatures follow one of the following two strategies; either produce a digital signature on the message to be signed, then encrypt th...
Laila El Aimani
CSREASAM
2010
14 years 9 months ago
A Security Measure Selection Scheme with Consideration of Potential Lawsuits
- Information breaches on ITC systems may result in lawsuits. Information security countermeasures such as firewalls, data encryption, and so on, are essential; protecting systems ...
Takumi Yamamoto, Yuma Usui, Fumihiko Magata, Yoshi...
ICMCS
2005
IEEE
88views Multimedia» more  ICMCS 2005»
15 years 5 months ago
Hash-based Counter Scheme for Digital Rights Management
This paper describes a counter scheme that uses hash functions to count how many times the user is allowed to play protected content in a DRM-enabled player. The proposed basic sc...
Mikko Löytynoja, Tapio Seppänen
JCDL
2004
ACM
106views Education» more  JCDL 2004»
15 years 5 months ago
Architecting an extensible digital repository
The Digital Collection and Archives (DCA) in partnership with Academic Technology (AT) at Tufts University developed a digital library solution for long-term storage and integrati...
Anoop Kumar, Ranjani Saigal, Robert Chavez, Nikola...
AGENTS
1998
Springer
15 years 4 months ago
Mobile Agents on the Digital Battlefield
Martin O. Hofmann, Amy McGovern, Kenneth R. Whiteb...