Abstract is missing.
- Adaptive traitor tracing for large anonymous attackHongxia Jin, Jeffrey B. Lotspiech, Michael Nelson, Nimrod Megiddo. 1-8 [doi]
- Public-key traitor tracing from efficient decoding and unbounded enrollment: extended abstractAggelos Kiayias, Moti Yung. 9-18 [doi]
- A four-layer model for security of digital rights managementEric Diehl. 19-28 [doi]
- A formal conceptual model for rightsPramod A. Jamkhedkar, Gregory L. Heileman. 29-38 [doi]
- Design rules for interoperable domains: controlling content dilution and content sharingGwenaël J. Doërr, Ton Kalker. 39-50 [doi]
- Content identificationYacov Yacobi. 51-52 [doi]
- Counterfeiting and anti-counterfeitingof software and contentYacov Yacobi, Gideon Yaniv. 53-58 [doi]
- RSA-TBOS signcryption with proxy re-encryptionVarad Kirtane, C. Pandu Rangan. 59-66 [doi]
- A decision theoretic framework for analyzing binary hash-based content identification systemsAvinash L. Varna, Ashwin Swaminathan, Min Wu. 67-76 [doi]
- Assessing privacy criteria for drm using eu privacy legislationAnja Becker, Alapan Arnab, Mercè Serra. 77-86 [doi]
- Enforcing DRM policies across applicationsSrijith Krishnan Nair, Andrew S. Tanenbaum, Gabriela Gheorghe, Bruno Crispo. 87-94 [doi]