Abstract is missing.
- On the security of a public-key traitor tracing scheme with sublinear ciphertext sizeAggelos Kiayias, Serdar Pehlivanoglu. 1-10 [doi]
- A simple construction for public-key encryption with revocable anonymity: the honest-sender caseDavide Alessio, Marc Joye. 11-16 [doi]
- On the operational semantics of rights expression languagesNicholas Paul Sheppard, Reihaneh Safavi-Naini. 17-28 [doi]
- An implementation experience of domain management in marlinSye Loong Keoh, Koen Vrielink. 29-38 [doi]
- Broadcast encryption versus public key cryptography in content protection systemsJeffrey B. Lotspiech. 39-46 [doi]
- Obfuscating straight line arithmetic programsSrivatsan Narayanan, Ananth Raghunathan, Ramarathnam Venkatesan. 47-58 [doi]
- A semi-dynamic multiple watermarking schemefor java applicationsChangjiang Zhang, Jianmin Wang, Clark D. Thomborson, Chaokun Wang, Christian S. Collberg. 59-72 [doi]
- Efficient license validation in MPML DRM architectureAmit Sachan, Sabu Emmanuel, Mohan S. Kankanhalli. 73-82 [doi]
- Videosurveillance and privacy: covering the two sides of the mirror with DRMJuan Ramón Troncoso-Pastoriza, Pedro Comesaña, Luis Pérez-Freire, Fernando Pérez-González. 83-94 [doi]