Abstract is missing.
- Consumers, fans, and control: what the games industry can teach Hollywood about DRMSusan Landau, Renee Stratulate, Doug Twilleager. 1-8 [doi]
- Vicarious infringement creates a privacy ceilingJanice Y. Tsai, Lorrie Faith Cranor, Scott Craver. 9-18 [doi]
- Verifiable digital object identity systemAlapan Arnab, Andrew Hutchison. 19-26 [doi]
- Securing sensitive content in a view-only file systemKevin Borders, Xin Zhao, Atul Prakash. 27-36 [doi]
- Privacy-enhanced superdistribution of layered content with trusted access controlDaniel J. T. Chong, Robert H. Deng. 37-44 [doi]
- On interoperability of DRMTon Kalker. 45-46 [doi]
- Proteus: virtualization for diversified tamper-resistanceBertrand Anckaert, Mariusz H. Jakubowski, Ramarathnam Venkatesan. 47-58 [doi]
- The problem with rights expression languagesPramod A. Jamkhedkar, Gregory L. Heileman, Iván Martínez-Ortiz. 59-68 [doi]
- Towards a secure and interoperable DRM architectureGelareh Taban, Alvaro A. Cárdenas, Virgil D. Gligor. 69-78 [doi]
- Towards an open, trusted digital rights management platformAndrew Cooper, Andrew Martin. 79-88 [doi]
- Graceful infringement reactions in DRM systemsStefan Katzenbeisser, Klaus Kursawe, Joop Talstra. 89-96 [doi]
- A robust content-dependent algorithm for video watermarkingLino Coria-Mendoza, Panos Nasiopoulos, Rabab Kreidieh Ward. 97-101 [doi]