researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2005
2006
Filter by Tag
OR
AND
NOT
1
C++
access control
architecture
contracts
design
multimedia
open-source
p2p
peer-to-peer
program transformation
rule-based
security
source-to-source
systematic-approach
transformation
watermarking
Filter by Author
[+]
OR
AND
NOT
1
Akhilesh Tyagi
André Adelsbach
Bin B. Zhu
Bin Zhu
Brian Blietz
Brian Fitzgerald
Clark D. Thomborson
D. Agrawal
Daesung Moon
David Kaminsky
Dong-Hwan Shin
Fenglian Shao
Guoping Qiu
Hideaki Sone
Hideki Imai
Hongmei Liu
Jiwu Huang
Marc P. C. Fossorier
Miodrag J. Mihaljevic
Ulrich Greveler
Filter by Top terms
[+]
OR
AND
NOT
1
broadcast
case
copyright
digital
drm
encryption
fingerprinting
implementation
law
management
novel
program
protection
rights
scheme
secure
security
software
system
using
DRMTICS (drmtics)
Editions
Publications
Viewing Publication 1 - 27 from 27
2006
Digital Rights Management: Technologies, Issues, Challenges and Systems, First International Conference, DRMTICS 2005, Sydney, Australia, October 31 - November 2, 2005, Revised Selected Papers
Reihaneh Safavi-Naini
,
Moti Yung
, editors,
Volume 3919 of
Lecture Notes in Computer Science
, Springer,
2006.
2005
A Broadcast Encryption Scheme with Free-Riders but Unconditional Security
André Adelsbach
,
Ulrich Greveler
.
drmtics 2006
:
246-257
[doi]
A Comparative Study of Specification Models for Autonomic Access Control of Digital Rights
Kailash Bhoopalam
,
Kurt Maly
,
Ravi Mukkamala
,
Mohammad Zubair
,
D. Agrawal
,
David Kaminsky
.
drmtics 2006
:
102-112
[doi]
Software Tamper Resistance Through Dynamic Program Monitoring
Brian Blietz
,
Akhilesh Tyagi
.
drmtics 2006
:
146-163
[doi]
The Australian Sony PlayStation Case: How Far Will Anti-circumvention Law Reach in the Name of DRM?
Brian Fitzgerald
.
drmtics 2006
:
32-51
[doi]
A Vector Approach to Cryptography Implementation
Jacques J. A. Fournier
,
Simon W. Moore
.
drmtics 2006
:
277-297
[doi]
TIVA: Trusted Integrity Verification Architecture
Mahadevan Gomathisankaran
,
Akhilesh Tyagi
.
drmtics 2006
:
13-31
[doi]
Enforcing Regional DRM for Multimedia Broadcasts With and Without Trusted Computing
Ulrich Greveler
.
drmtics 2006
:
332-340
[doi]
The Effect of Fidelity Measure Functions on the Capacity of Digital Watermarks
Yanjun Hu
,
Xiaoping Ma
,
Linming Dou
,
Ying Chen
.
drmtics 2006
:
113-122
[doi]
Real-Time Implementation of Broadcast Switching System Using Audio Watermark
Jong-Weon Kim
,
Dong-Hwan Shin
,
Jong-Uk Choi
.
drmtics 2006
:
322-331
[doi]
Secure Remote Fingerprint Verification Using Dual Watermarks
Taehae Kim
,
Yongwha Chung
,
Seunghwan Jung
,
Daesung Moon
.
drmtics 2006
:
217-227
[doi]
Digital Rights Management: Merging Contract, Copyright and Criminal Law
Yee Fen Lim
.
drmtics 2006
:
66-74
[doi]
A MPEG-2 Video Watermarking Algorithm with Compensation in Bit Stream
Hongmei Liu
,
Fenglian Shao
,
Jiwu Huang
.
drmtics 2006
:
123-134
[doi]
A Novel Broadcast Encryption Based on Time-Bound Cryptographic Keys
Miodrag J. Mihaljevic
,
Marc P. C. Fossorier
,
Hideki Imai
.
drmtics 2006
:
258-276
[doi]
Security Weaknesses of Certain Broadcast Encryption Schemes
Miodrag J. Mihaljevic
,
Marc P. C. Fossorier
,
Hideki Imai
.
drmtics 2006
:
228-245
[doi]
Worst-Case Optimal Fingerprinting Codes for Non-threshold Collusion
Takaaki Mizuki
,
Satoshi Nounin
,
Hideaki Sone
,
Yousuke Toyota
.
drmtics 2006
:
203-216
[doi]
Design of a Secure Digital Contents Delivery System in P2P Networks
Youngho Park
,
Jung-Hwa Shin
,
Kyung Hyune Rhee
.
drmtics 2006
:
311-321
[doi]
User-Attributed Rights in DRM
Milan Petkovic
,
R. Paul Koster
.
drmtics 2006
:
75-89
[doi]
Call Tree Transformation for Program Obfuscation and Copy Protection
Valery Pryamikov
.
drmtics 2006
:
164-179
[doi]
AVS-REL - A New Right Expression Language
Ying Sha
.
drmtics 2006
:
90-101
[doi]
Downloading vs Purchase: Music Industry vs Consumers
Supriya Singh
,
Margaret Jackson
,
Jenny Waycott
,
Jenine P. Beekhuyzen
.
drmtics 2006
:
52-65
[doi]
A Novel Privacy and Copyright Protection Enforced Peer-to-Peer Network
Xiaoming Wang
,
Bin Zhu
,
Shipeng Li
.
drmtics 2006
:
298-310
[doi]
Reversible Semi-fragile Image Authentication Using Zernike Moments and Integer Wavelet Transform
Xiaoyun Wu
,
Xiaoping Liang
,
Hongmei Liu
,
Jiwu Huang
,
Guoping Qiu
.
drmtics 2006
:
135-145
[doi]
An Efficient Fingerprinting Scheme with Secret Sharing
Seunglim Yong
,
Sang Ho Lee
.
drmtics 2006
:
192-202
[doi]
A Novel Framework for Multiple Creatorship Protection of Digital Movies
Yu-Quan Zhang
,
Sabu Emmanuel
.
drmtics 2006
:
1-12
[doi]
Algorithms to Watermark Software Through Register Allocation
William Zhu
,
Clark D. Thomborson
.
drmtics 2006
:
180-191
[doi]
A DRM System Supporting What You See Is What You Pay
Bin B. Zhu
,
Yang Yang
,
Tierui Chen
.
drmtics 2006
:
341-355
[doi]
Sign in
or
sign up
to see more results.