Abstract is missing.
- Is DRM working?: how could we tell?Bruce E. Boyden. 1-2 [doi]
- Integrated circuit digital rights management techniques using physical level characterizationSheng Wei, Farinaz Koushanfar, Miodrag Potkonjak. 3-14 [doi]
- Traitor tracing schemes for protected software implementationsMarc Joye, Tancrède Lepoint. 15-22 [doi]
- A rights management approach to protection of privacy in a cloud of electronic health recordsMohammad Jafari, Reihaneh Safavi-Naini, Nicholas Paul Sheppard. 23-30 [doi]
- Tunneled TLS for multi-factor authenticationDarko Kirovski, Christopher Meek. 31-40 [doi]
- Fast and adaptive tracing strategies for 3-secure fingerprint watermarking codesMarcel Schäfer, Waldemar Berchtold, Martin Steinebach. 41-50 [doi]
- A domain specific language for usage managementChristopher C. Lamb, Pramod A. Jamkhedkar, Mathew P. Bohnsack, Viswanath Nandina, Gregory L. Heileman. 51-62 [doi]