Abstract is missing.
- A White-Box DES Implementation for DRM ApplicationsStanley Chow, Philip A. Eisen, Harold Johnson, Paul C. van Oorschot. 1-15 [doi]
- Attacking an Obfuscated Cipher by Injecting FaultsMatthias Jacob, Dan Boneh, Edward W. Felten. 16-31 [doi]
- Breaking and Repairing Asymmetric Public-Key Traitor TracingAggelos Kiayias, Moti Yung. 32-50 [doi]
- Key Challenges in DRM: An Industry PerspectiveBrian A. LaMacchia. 51-60 [doi]
- Public Key Broadcast Encryption for Stateless ReceiversYevgeniy Dodis, Nelly Fazio. 61-80 [doi]
- Traitor Tracing for Shortened and Corrupted FingerprintsReihaneh Safavi-Naini, Yejing Wang. 81-100 [doi]
- Evaluating New Copy-Prevention Techniques for Audio CDsJohn A. Halderman. 101-117 [doi]
- Towards Meeting the Privacy Challenge: Adapting DRMLarry Korba, Steve Kenny. 118-136 [doi]
- Implementing Copyright Limitations in Rights Expression LanguagesDeirdre K. Mulligan, Aaron J. Burstein. 137-154 [doi]
- The Darknet and the Future of Content ProtectionPeter Biddle, Paul England, Marcus Peinado, Bryan Willman. 155-176 [doi]
- Replacement Attack on Arbitrary Watermarking SystemsDarko Kirovski, Fabien A. P. Petitcolas. 177-189 [doi]
- FAIR: Fair Audience InfeRenceRobert Johnson, Jessica Staddon. 190-207 [doi]
- Theft-Protected Proprietary CertificatesAlexandra Boldyreva, Markus Jakobsson. 208-220 [doi]