default search action
Digital Rights Management Workshop 2003: Washington, DC, USA
- Moti Yung:
Proceedings of the 2003 ACM workshop on Digital rights management 2003, Washington, DC, USA, October 27, 2003. ACM 2003, ISBN 1-58113-786-9
DRM experience
- Simon D. Byers, Lorrie Faith Cranor, David P. Kormann, Patrick D. McDaniel, Eric Cronin:
Analysis of security vulnerabilities in the movie production and distribution process. 1-12 - Howard Goldstein, Gregory L. Heileman, Mark D. Heileman, Theo Nicolakis, Carlos E. Pizano, Bianca Prumo, Mitchell Webb:
Protecting digital archives at the Greek Orthodox Archdiocese of America. 13-26 - Thomas S. Messerges, Ezzat A. Dabbish:
Digital rights management in a 3G mobile phone and beyond. 27-38 - Tsvi Gal, Howard M. Singer, Laird Popkin:
The IP war: apocalypse or revolution? 39-46
Supporting cryptographic technology
- Yevgeniy Dodis, Leonid Reyzin:
Breaking and repairing optimistic fair exchange from PODC 2003. 47-54 - Nuttapong Attrapadung, Kazukuni Kobara, Hideki Imai:
Broadcast encryption with short keys and transmissions. 55-66 - Vu Dong Tô, Reihaneh Safavi-Naini, Fangguo Zhang:
New traitor tracing schemes using bilinear map. 67-76
Copyrights and access-rights
- Deirdre K. Mulligan, John Han, Aaron J. Burstein:
How DRM-based content delivery systems disrupt expectations of "personal use". 77-89 - Susanne Guth, Gustaf Neumann, Mark Strembeck:
Experiences with the enforcement of access rights extracted from ODRL-based digital contracts. 90-102 - Özlem Uzuner, Randall Davis:
Content and expression-based copy recognition for intellectual property protection. 103-110
Watermarking
- André Adelsbach, Stefan Katzenbeisser, Helmut Veith:
Watermarking schemes provably secure against copy and ambiguity attacks. 111-119 - Gregory L. Heileman, Yunlong Yang:
The effects of invisible watermarking on satellite image classification. 120-132
Software and systems
- Yingjiu Li, Vipin Swarup, Sushil Jajodia:
Constructing a virtual primary key for fingerprinting relational data. 133-141 - Mikhail Sosonkin, Gleb Naumovich, Nasir D. Memon:
Obfuscation of design intent in object-oriented applications. 142-153
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.