As medical image databases are connected together through PACS, those medical images may suffer from security breaches if not protected. If a medical image is illegally obtained o...
Traitor tracing schemes are of major importance for secure distribution of digital content. They indeed aim at protecting content providers from colluding users to build pirate dec...
— Intellectual property (IP) block reuse is essential for facilitating the design process of System-on-a-Chip. Sharing IP blocks in such a competitive market poses significant h...
— Detailed and expressive e-learning specifications like IMS LD [1] are necessary to create efficient e-learning applications. E-learning specifications that meet these demand...
We show that the time web sites take to respond to HTTP requests can leak private information, using two different types of attacks. The first, direct timing, directly measures re...