researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2003
2004
2005
2006
2007
2008
2009
2010
2011
Filter by Tag
[+]
OR
AND
NOT
1
C++
Java
Meta-Environment
access control
analysis
architecture
case study
classification
contracts
data-flow
data-flow programming
design
meta-model
meta-objects
mobile
open-source
operational semantics
rule-based
security
watermarking
Filter by Author
[+]
OR
AND
NOT
1
Aggelos Kiayias
Ahmad-Reza Sadeghi
Alapan Arnab
Andrew Hutchison
Andrew S. Tanenbaum
André Adelsbach
Bertrand Anckaert
Bjorn De Sutter
Bruno Crispo
C. Pandu Rangan
Christopher C. Lamb
Dirk Günnewig
Eberhard Becker
Gregory L. Heileman
Nicholas Paul Sheppard
Pramod A. Jamkhedkar
Ramarathnam Venkatesan
Reihaneh Safavi-Naini
Susanne Guth
Willms Buhse
Filter by Top terms
[+]
OR
AND
NOT
1
access
acm
analysis
content
digital
drm
encryption
management
october
privacy
proceedings
protection
rights
software
systems
tracing
usa
using
watermarking
workshop
Digital Rights Management (drm)
Editions
Publications
Viewing Publication 1 - 100 from 149
2011
Is DRM working?: how could we tell?
Bruce E. Boyden
.
drm 2011
:
1-2
[doi]
Proceedings of the 11th ACM Workshop on Digital Rights Management, Chicago, Illinois, USA, October 21, 2011
Yan Chen
,
Stefan Katzenbeisser
,
Ahmad-Reza Sadeghi
, editors,
ACM,
2011.
[doi]
A rights management approach to protection of privacy in a cloud of electronic health records
Mohammad Jafari
,
Reihaneh Safavi-Naini
,
Nicholas Paul Sheppard
.
drm 2011
:
23-30
[doi]
Traitor tracing schemes for protected software implementations
Marc Joye
,
Tancrède Lepoint
.
drm 2011
:
15-22
[doi]
Tunneled TLS for multi-factor authentication
Darko Kirovski
,
Christopher Meek
.
drm 2011
:
31-40
[doi]
A domain specific language for usage management
Christopher C. Lamb
,
Pramod A. Jamkhedkar
,
Mathew P. Bohnsack
,
Viswanath Nandina
,
Gregory L. Heileman
.
drm 2011
:
51-62
[doi]
Fast and adaptive tracing strategies for 3-secure fingerprint watermarking codes
Marcel Schäfer
,
Waldemar Berchtold
,
Martin Steinebach
.
drm 2011
:
41-50
[doi]
Integrated circuit digital rights management techniques using physical level characterization
Sheng Wei
,
Farinaz Koushanfar
,
Miodrag Potkonjak
.
drm 2011
:
3-14
[doi]
2010
Proceedings of the 10th ACM Workshop on Digital Rights Management, Chicago, Illinois, USA, October 4, 2010
Ehab Al-Shaer
,
Hongxia Jin
,
Marc Joye
, editors,
ACM,
2010.
[doi]
Robust fingerprinting codes: a near optimal construction
Dan Boneh
,
Aggelos Kiayias
,
Hart William Montgomery
.
drm 2010
:
3-12
[doi]
A general model for hiding control flow
Jan Cappaert
,
Bart Preneel
.
drm 2010
:
35-42
[doi]
A chameleon encryption scheme resistant to known-plaintext attack
Ee-Chien Chang
,
Chengfang Fang
,
Jia Xu
.
drm 2010
:
25-34
[doi]
An introduction to interoperable digital rights locker
Eric Diehl
,
Arnaud Robert
.
drm 2010
:
51-54
[doi]
An analysis of interoperability between licenses
Kunihiko Fujita
,
Yasuyuki Tsukada
.
drm 2010
:
61-72
[doi]
Secure cross-domain data sharing architecture for crisis management
Vaibhav Gowadia
,
Enrico Scalavino
,
Emil C. Lupu
,
Dmitry Starostin
,
Alexey Orlov
.
drm 2010
:
43-46
[doi]
Using digital rights management for securing data in a medical research environment
Mohammad Jafari
,
Reihaneh Safavi-Naini
,
Chad Saunders
,
Nicholas Paul Sheppard
.
drm 2010
:
55-60
[doi]
An interoperable usage management framework
Pramod A. Jamkhedkar
,
Gregory L. Heileman
,
Christopher C. Lamb
.
drm 2010
:
73-88
[doi]
An efficient public-key attribute-based broadcast encryption scheme allowing arbitrary access policies
Pascal Junod
,
Alexandre Karlov
.
drm 2010
:
13-24
[doi]
New construction of identity-based proxy re-encryption
Song Luo
,
Jian-bin Hu
,
Zhong Chen
.
drm 2010
:
47-50
[doi]
The privacy of tracing traitors
Moni Naor
.
drm 2010
:
1-2
[doi]
2009
Proceedings of the 9th ACM Workshop on Digital Rights Management, Chicago, Illinois, USA, November 9, 2009
Ehab Al-Shaer
,
Hongxia Jin
,
Gregory L. Heileman
, editors,
ACM,
2009.
A simple construction for public-key encryption with revocable anonymity: the honest-sender case
Davide Alessio
,
Marc Joye
.
drm 2009
:
11-16
[doi]
An implementation experience of domain management in marlin
Sye Loong Keoh
,
Koen Vrielink
.
drm 2009
:
29-38
[doi]
On the security of a public-key traitor tracing scheme with sublinear ciphertext size
Aggelos Kiayias
,
Serdar Pehlivanoglu
.
drm 2009
:
1-10
[doi]
Broadcast encryption versus public key cryptography in content protection systems
Jeffrey B. Lotspiech
.
drm 2009
:
39-46
[doi]
Obfuscating straight line arithmetic programs
Srivatsan Narayanan
,
Ananth Raghunathan
,
Ramarathnam Venkatesan
.
drm 2009
:
47-58
[doi]
Efficient license validation in MPML DRM architecture
Amit Sachan
,
Sabu Emmanuel
,
Mohan S. Kankanhalli
.
drm 2009
:
73-82
[doi]
On the operational semantics of rights expression languages
Nicholas Paul Sheppard
,
Reihaneh Safavi-Naini
.
drm 2009
:
17-28
[doi]
Videosurveillance and privacy: covering the two sides of the mirror with DRM
Juan Ramón Troncoso-Pastoriza
,
Pedro Comesaña
,
Luis Pérez-Freire
,
Fernando Pérez-González
.
drm 2009
:
83-94
[doi]
A semi-dynamic multiple watermarking schemefor java applications
Changjiang Zhang
,
Jianmin Wang
,
Clark D. Thomborson
,
Chaokun Wang
,
Christian S. Collberg
.
drm 2009
:
59-72
[doi]
2008
Assessing privacy criteria for drm using eu privacy legislation
Anja Becker
,
Alapan Arnab
,
Mercè Serra
.
drm 2008
:
77-86
[doi]
A four-layer model for security of digital rights management
Eric Diehl
.
drm 2008
:
19-28
[doi]
Design rules for interoperable domains: controlling content dilution and content sharing
Gwenaël J. Doërr
,
Ton Kalker
.
drm 2008
:
39-50
[doi]
Proceedings of the 8th ACM Workshop on Digital Rights Management, Alexandria, VA, USA, October 27, 2008
Gregory L. Heileman
,
Marc Joye
, editors,
ACM,
2008.
A formal conceptual model for rights
Pramod A. Jamkhedkar
,
Gregory L. Heileman
.
drm 2008
:
29-38
[doi]
Adaptive traitor tracing for large anonymous attack
Hongxia Jin
,
Jeffrey B. Lotspiech
,
Michael Nelson
,
Nimrod Megiddo
.
drm 2008
:
1-8
[doi]
Public-key traitor tracing from efficient decoding and unbounded enrollment: extended abstract
Aggelos Kiayias
,
Moti Yung
.
drm 2008
:
9-18
[doi]
RSA-TBOS signcryption with proxy re-encryption
Varad Kirtane
,
C. Pandu Rangan
.
drm 2008
:
59-66
[doi]
Enforcing DRM policies across applications
Srijith Krishnan Nair
,
Andrew S. Tanenbaum
,
Gabriela Gheorghe
,
Bruno Crispo
.
drm 2008
:
87-94
[doi]
A decision theoretic framework for analyzing binary hash-based content identification systems
Avinash L. Varna
,
Ashwin Swaminathan
,
Min Wu
.
drm 2008
:
67-76
[doi]
Counterfeiting and anti-counterfeitingof software and content
Yacov Yacobi
,
Gideon Yaniv
.
drm 2008
:
53-58
[doi]
Content identification
Yacov Yacobi
.
drm 2008
:
51-52
[doi]
2007
Persistent access control: a formal model for DRM
Alapan Arnab
,
Andrew Hutchison
.
drm 2007
:
41-53
[doi]
Drm to counter side-channel attacks?
Ryad Benadjila
,
Olivier Billet
,
Stanislas Francfort
.
drm 2007
:
23-32
[doi]
The drm game
Gregory L. Heileman
,
Pramod A. Jamkhedkar
,
Joud Khoury
,
Curtis J. Hrncir
.
drm 2007
:
54-62
[doi]
Randomized radon transforms for biometric authentication via fingerprint hashing
Mariusz H. Jakubowski
,
Ramarathnam Venkatesan
.
drm 2007
:
90-94
[doi]
A security architecture for pay-per-view business models in conditional access systems
Bart Kirkels
,
Martijn Maas
,
Peter Roelse
.
drm 2007
:
1-9
[doi]
Slicing obfuscations: design, correctness, and evaluation
Anirban Majumdar
,
Stephen Drape
,
Clark D. Thomborson
.
drm 2007
:
70-81
[doi]
Mechanism for software tamper resistance: an application of white-box cryptography
Wil Michiels
,
Paul Gorissen
.
drm 2007
:
82-89
[doi]
Digital rights management: desirable, inevitable, and almost irrelevant
Andrew M. Odlyzko
.
drm 2007
:
39-40
[doi]
On implementing mpeg-21 intellectual property management and protection
Nicholas Paul Sheppard
.
drm 2007
:
10-22
[doi]
Data structures for limited oblivious execution of programs while preserving locality of reference
Avinash V. Varadarajan
,
Ramarathnam Venkatesan
,
C. Pandu Rangan
.
drm 2007
:
63-69
[doi]
Protecting fair use from digital rights management in china
Huijia Xie
.
drm 2007
:
33-38
[doi]
Proceedings of the Seventh ACM Workshop on Digital Rights Management, Alexandria, VA, USA, October 29, 2007
Moti Yung
,
Aggelos Kiayias
,
Ahmad-Reza Sadeghi
, editors,
ACM,
2007.
2006
Proteus: virtualization for diversified tamper-resistance
Bertrand Anckaert
,
Mariusz H. Jakubowski
,
Ramarathnam Venkatesan
.
drm 2006
:
47-58
[doi]
Verifiable digital object identity system
Alapan Arnab
,
Andrew Hutchison
.
drm 2006
:
19-26
[doi]
Securing sensitive content in a view-only file system
Kevin Borders
,
Xin Zhao
,
Atul Prakash
.
drm 2006
:
27-36
[doi]
Privacy-enhanced superdistribution of layered content with trusted access control
Daniel J. T. Chong
,
Robert H. Deng
.
drm 2006
:
37-44
[doi]
Towards an open, trusted digital rights management platform
Andrew Cooper
,
Andrew Martin
.
drm 2006
:
79-88
[doi]
A robust content-dependent algorithm for video watermarking
Lino Coria-Mendoza
,
Panos Nasiopoulos
,
Rabab Kreidieh Ward
.
drm 2006
:
97-101
[doi]
The problem with rights expression languages
Pramod A. Jamkhedkar
,
Gregory L. Heileman
,
Iván Martínez-Ortiz
.
drm 2006
:
59-68
[doi]
On interoperability of DRM
Ton Kalker
.
drm 2006
:
45-46
[doi]
Graceful infringement reactions in DRM systems
Stefan Katzenbeisser
,
Klaus Kursawe
,
Joop Talstra
.
drm 2006
:
89-96
[doi]
Consumers, fans, and control: what the games industry can teach Hollywood about DRM
Susan Landau
,
Renee Stratulate
,
Doug Twilleager
.
drm 2006
:
1-8
[doi]
Towards a secure and interoperable DRM architecture
Gelareh Taban
,
Alvaro A. Cárdenas
,
Virgil D. Gligor
.
drm 2006
:
69-78
[doi]
Vicarious infringement creates a privacy ceiling
Janice Y. Tsai
,
Lorrie Faith Cranor
,
Scott Craver
.
drm 2006
:
9-18
[doi]
Proceedings of the Sixth ACM Workshop on Digital Rights Management, Alexandria, VA, USA, October 30, 2006
Moti Yung
,
Kaoru Kurosawa
,
Reihaneh Safavi-Naini
, editors,
ACM,
2006.
2005
Towards multilateral secure digital rights distribution infrastructures
André Adelsbach
,
Markus Rohe
,
Ahmad-Reza Sadeghi
.
drm 2005
:
45-54
[doi]
Fairer usage contracts for DRM
Alapan Arnab
,
Andrew Hutchison
.
drm 2005
:
1-7
[doi]
Control flow based obfuscation
Jun Ge
,
Soma Chaudhuri
,
Akhilesh Tyagi
.
drm 2005
:
83-92
[doi]
DRM interoperability analysis from the perspective of a layered framework
Gregory L. Heileman
,
Pramod A. Jamkhedkar
.
drm 2005
:
17-26
[doi]
DRMs, fair use and users experience of sharing music
Margaret Jackson
,
Supriya Singh
,
Jenine P. Beekhuyzen
,
Jennifer Waycott
.
drm 2005
:
8-16
[doi]
New broadcast encryption scheme using tree-based circle
Nam-Su Jho
,
Eun Sun Yoo
,
Jung Hee Cheon
,
Myung-Hwan Kim
.
drm 2005
:
37-44
[doi]
Achieving media portability through local content translation and end-to-end rights management
David W. Kravitz
,
Thomas S. Messerges
.
drm 2005
:
27-36
[doi]
Hybrid static-dynamic attacks against software protection mechanisms
Matias Madou
,
Bertrand Anckaert
,
Bjorn De Sutter
,
Koen De Bosschere
.
drm 2005
:
75-82
[doi]
Improved watermark detection for spread-spectrum based watermarking using independent component analysis
Hafiz Malik
,
Ashfaq A. Khokhar
,
Rashid Ansari
.
drm 2005
:
102-111
[doi]
Authorization for digital rights management in the geospatial domain
Andreas Matheus
.
drm 2005
:
55-64
[doi]
Towards a software architecture for DRM
Sam Michiels
,
Kristof Verslype
,
Wouter Joosen
,
Bart De Decker
.
drm 2005
:
65-74
[doi]
Statistical audio watermarking algorithm based on perceptual analysis
Xiaomei Quan
,
Hongbin Zhang
.
drm 2005
:
112-118
[doi]
Proceedings of the Fifth ACM Workshop on Digital Rights Management, Alexandria, VA, USA, November 7, 2005
Reihaneh Safavi-Naini
,
Moti Yung
, editors,
ACM,
2005.
Watermarking and ownership problem: a revisit
Husrev T. Sencar
,
Nasir D. Memon
.
drm 2005
:
93-101
[doi]
2004
Software piracy prevention through diversity
Bertrand Anckaert
,
Bjorn De Sutter
,
Koen De Bosschere
.
drm 2004
:
63-71
[doi]
On the implications of machine virtualization for DRM and fair use: a case study of a virtual audio device driver
Ninad Ghodke
,
Renato J. O. Figueiredo
.
drm 2004
:
91-98
[doi]
DRM as a layered system
Pramod A. Jamkhedkar
,
Gregory L. Heileman
.
drm 2004
:
11-21
[doi]
Traitor tracing for prerecorded and recordable media
Hongxia Jin
,
Jeffery Lotspiech
,
Stefan Nusser
.
drm 2004
:
83-90
[doi]
Proceedings of the 2004 ACM Workshop on Digital Rights Management 2004, Washington, DC, USA, October 25, 2004
Aggelos Kiayias
,
Moti Yung
, editors,
ACM,
2004.
Tamper detection and localization for categorical data using fragile watermarks
Yingjiu Li
,
Huiping Guo
,
Sushil Jajodia
.
drm 2004
:
73-82
[doi]
Analysis of an incentives-based secrets protection system
N. Boris Margolin
,
Matthew Wright
,
Brian Neil Levine
.
drm 2004
:
22-30
[doi]
A DRM security architecture for home networks
Bogdan C. Popescu
,
Bruno Crispo
,
Andrew S. Tanenbaum
,
Frank Kamperman
.
drm 2004
:
1-10
[doi]
Reconfigurable hardware solutions for the digital rights management of digital cinema
Gaël Rouvroy
,
François-Xavier Standaert
,
Frédéric Lefèbvre
,
Jean-Jacques Quisquater
,
Benoit M. Macq
,
Jean-Didier Legat
.
drm 2004
:
40-53
[doi]
Import/export in digital rights management
Reihaneh Safavi-Naini
,
Nicholas Paul Sheppard
,
Takeyuki Uehara
.
drm 2004
:
99-110
[doi]
Tracing traitors: a selective survey
Reihaneh Safavi-Naini
.
drm 2004
:
72
[doi]
Attacks and risk analysis for hardware supported software copy protection systems
Weidong Shi
,
Hsien-Hsin S. Lee
,
Chenghuai Lu
,
Tao Zhang
.
drm 2004
:
54-62
[doi]
Display-only file server: a solution against information theft due to insider attack
Yang Yu
,
Tzi-cker Chiueh
.
drm 2004
:
31-39
[doi]
2003
The Basic Economic Theory of Copying
Tobias Bauckhage
.
drm 2003
:
234-249
[doi]
The German Copyright - Yesterday, Today, Tomorrow
Thomas Dreier
,
Georg Nolte
.
drm 2003
:
479-501
[doi]
Tipping the Scale in Favor of the Right Holders: The European Anti-Circumvention Provisions
Séverine Dusollier
.
drm 2003
:
462-478
[doi]
Copy Protection by DRM in the EU and Germany: Legal Aspects
Bettina Goldmann
.
drm 2003
:
502-519
[doi]
Trusted Platforms, DRM, and Beyond
Dirk Kuhlmann
,
Robert A. Gehring
.
drm 2003
:
178-205
[doi]
Identification and Metadata
Norman Paskin
.
drm 2003
:
26-61
[doi]
Sign in
or
sign up
to see more results.