Most cryptographic algorithms provide a means for secret and authentic communication. However, under many circumstances, the ability to repudiate messages or deny a conversation i...
Ian Goldberg, Berkant Ustaoglu, Matthew Van Gundy,...
Digital videos are increasingly adopted in various multimedia applications where they are usually broadcasted or transmitted as video streams. Continuously monitoring copies on the...
The increasing number of personal digital photos on the Web makes their management, retrieval and visualization a difficult task. To annotate these images using Semantic Web techno...
The current deployment of Digital Right Management (DRM) schemes to distribute protected contents and rights is leading the way to massive use of sophisticated embedded cryptograph...
As users get connected with new-generation smart programmable phones and Personal Digital Assistants, they look for geographic information and location-aware services. In such a s...