Abstract is missing.
- Discouraging Software Piracy Using Software AgingMarkus Jakobsson, Michael K. Reiter. 1-12 [doi]
- New Iterative Geometric Methods for Robust Perceptual Image HashingMehmet Kivanç Mihçak, Ramarathnam Venkatesan. 13-21 [doi]
- On Crafty Pirates and Foxy TracersAggelos Kiayias, Moti Yung. 22-39 [doi]
- Efficient State Updates for Key ManagementBenny Pinkas. 40-56 [doi]
- Collusion Secure q-ary Fingerprinting for Perceptual ContentReihaneh Safavi-Naini, Yejing Wang. 57-75 [doi]
- Privacy Engineering for Digital Rights Management SystemsJoan Feigenbaum, Michael J. Freedman, Tomas Sander, Adam Shostack. 76-105 [doi]
- Secure Open Systems for Protecting Privacy and Digital ServicesDavid W. Kravitz, Kim-Ee Yeoh, Nicol So. 106-125 [doi]
- MPEG-4 IPMP ExtensionsJames King, Panos Kudumakis. 126-140 [doi]
- Dynamic Self-Checking Techniques for Improved Tamper ResistanceBill G. Horne, Lesley R. Matheson, Casey Sheehan, Robert Endre Tarjan. 141-159 [doi]
- Protecting Software Code by GuardsHoi Chang, Mikhail J. Atallah. 160-175 [doi]
- How to Manage Persistent State in DRM SystemsWilliam Shapiro, Radek Vingralek. 176-191 [doi]
- A Cryptanalysis of the High-Bandwidth Digital Content Protection SystemScott Crosby, Ian Goldberg, Robert Johnson, Dawn Xiaodong Song, David Wagner. 192-200 [doi]
- Implications of Digital Rights Management for Online Music - A Business PerspectiveWillms Buhse. 201-212 [doi]
- From Copyright to Information Law - Implications of Digital Rights ManagementStefan Bechtold. 213-232 [doi]
- Taking the Copy Out of CopyrightErnest Miller, Joan Feigenbaum. 233-244 [doi]