Abstract is missing.
- A DRM security architecture for home networksBogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum, Frank Kamperman. 1-10 [doi]
- DRM as a layered systemPramod A. Jamkhedkar, Gregory L. Heileman. 11-21 [doi]
- Analysis of an incentives-based secrets protection systemN. Boris Margolin, Matthew Wright, Brian Neil Levine. 22-30 [doi]
- Display-only file server: a solution against information theft due to insider attackYang Yu, Tzi-cker Chiueh. 31-39 [doi]
- Reconfigurable hardware solutions for the digital rights management of digital cinemaGaël Rouvroy, François-Xavier Standaert, Frédéric Lefèbvre, Jean-Jacques Quisquater, Benoit M. Macq, Jean-Didier Legat. 40-53 [doi]
- Attacks and risk analysis for hardware supported software copy protection systemsWeidong Shi, Hsien-Hsin S. Lee, Chenghuai Lu, Tao Zhang. 54-62 [doi]
- Software piracy prevention through diversityBertrand Anckaert, Bjorn De Sutter, Koen De Bosschere. 63-71 [doi]
- Tracing traitors: a selective surveyReihaneh Safavi-Naini. 72 [doi]
- Tamper detection and localization for categorical data using fragile watermarksYingjiu Li, Huiping Guo, Sushil Jajodia. 73-82 [doi]
- Traitor tracing for prerecorded and recordable mediaHongxia Jin, Jeffery Lotspiech, Stefan Nusser. 83-90 [doi]
- On the implications of machine virtualization for DRM and fair use: a case study of a virtual audio device driverNinad Ghodke, Renato J. O. Figueiredo. 91-98 [doi]
- Import/export in digital rights managementReihaneh Safavi-Naini, Nicholas Paul Sheppard, Takeyuki Uehara. 99-110 [doi]