Sciweavers

222 search results - page 41 / 45
» Secure Content Delivery using Key Composition
Sort
View
ERCIMDL
2003
Springer
114views Education» more  ERCIMDL 2003»
15 years 4 months ago
Implementing Preservation Strategies for Complex Multimedia Objects
Addressing the preservation and long-term access issues for digital resources is one of the key challenges facing informational organisations such as libraries, archives, cultural ...
Jane Hunter, Sharmin Choudhury
ODRL
2004
15 years 1 months ago
Interoperability between ODRL and MPEG-21 REL
Two main Rights Expression Languages (RELs) exist to describe licenses governing the access to digital content: ODRL (Open Digital Rights Language) and MPEG-21 REL. Both RELs are ...
Josep Polo, Jose Prados, Jaime Delgado
IJNSEC
2011
167views more  IJNSEC 2011»
14 years 6 months ago
New Real Time Multicast Authentication Protocol
Multicast gives professional large-scale content distribution by providing an efficient transport mechanism for one-to-many and many-to-many communications. There is a number of s...
Riham Abdellatif, Heba Kamal Aslan, Salwa H. Elram...
ASIACRYPT
2005
Springer
15 years 5 months ago
Spreading Alerts Quietly and the Subgroup Escape Problem
We introduce a new cryptographic primitive called the blind coupon mechanism (BCM). In effect, the BCM is an authenticated bit commitment scheme, which is AND-homomorphic. It has n...
James Aspnes, Zoë Diamadi, Kristian Gjø...
PODC
2003
ACM
15 years 4 months ago
Scalable public-key tracing and revoking
Traitor Tracing Schemes constitute a very useful tool against piracy in the context of digital content broadcast. In such multi-recipient encryption schemes, each decryption key is...
Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti...