Abstract is missing.
- A Novel Framework for Multiple Creatorship Protection of Digital MoviesYu-Quan Zhang, Sabu Emmanuel. 1-12 [doi]
- TIVA: Trusted Integrity Verification ArchitectureMahadevan Gomathisankaran, Akhilesh Tyagi. 13-31 [doi]
- The Australian Sony PlayStation Case: How Far Will Anti-circumvention Law Reach in the Name of DRM?Brian Fitzgerald. 32-51 [doi]
- Downloading vs Purchase: Music Industry vs ConsumersSupriya Singh, Margaret Jackson, Jenny Waycott, Jenine P. Beekhuyzen. 52-65 [doi]
- Digital Rights Management: Merging Contract, Copyright and Criminal LawYee Fen Lim. 66-74 [doi]
- User-Attributed Rights in DRMMilan Petkovic, R. Paul Koster. 75-89 [doi]
- AVS-REL - A New Right Expression LanguageYing Sha. 90-101 [doi]
- A Comparative Study of Specification Models for Autonomic Access Control of Digital RightsKailash Bhoopalam, Kurt Maly, Ravi Mukkamala, Mohammad Zubair, D. Agrawal, David Kaminsky. 102-112 [doi]
- The Effect of Fidelity Measure Functions on the Capacity of Digital WatermarksYanjun Hu, Xiaoping Ma, Linming Dou, Ying Chen. 113-122 [doi]
- A MPEG-2 Video Watermarking Algorithm with Compensation in Bit StreamHongmei Liu, Fenglian Shao, Jiwu Huang. 123-134 [doi]
- Reversible Semi-fragile Image Authentication Using Zernike Moments and Integer Wavelet TransformXiaoyun Wu, Xiaoping Liang, Hongmei Liu, Jiwu Huang, Guoping Qiu. 135-145 [doi]
- Software Tamper Resistance Through Dynamic Program MonitoringBrian Blietz, Akhilesh Tyagi. 146-163 [doi]
- Call Tree Transformation for Program Obfuscation and Copy ProtectionValery Pryamikov. 164-179 [doi]
- Algorithms to Watermark Software Through Register AllocationWilliam Zhu, Clark D. Thomborson. 180-191 [doi]
- An Efficient Fingerprinting Scheme with Secret SharingSeunglim Yong, Sang Ho Lee. 192-202 [doi]
- Worst-Case Optimal Fingerprinting Codes for Non-threshold CollusionTakaaki Mizuki, Satoshi Nounin, Hideaki Sone, Yousuke Toyota. 203-216 [doi]
- Secure Remote Fingerprint Verification Using Dual WatermarksTaehae Kim, Yongwha Chung, Seunghwan Jung, Daesung Moon. 217-227 [doi]
- Security Weaknesses of Certain Broadcast Encryption SchemesMiodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai. 228-245 [doi]
- A Broadcast Encryption Scheme with Free-Riders but Unconditional SecurityAndré Adelsbach, Ulrich Greveler. 246-257 [doi]
- A Novel Broadcast Encryption Based on Time-Bound Cryptographic KeysMiodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai. 258-276 [doi]
- A Vector Approach to Cryptography ImplementationJacques J. A. Fournier, Simon W. Moore. 277-297 [doi]
- A Novel Privacy and Copyright Protection Enforced Peer-to-Peer NetworkXiaoming Wang, Bin Zhu, Shipeng Li. 298-310 [doi]
- Design of a Secure Digital Contents Delivery System in P2P NetworksYoungho Park, Jung-Hwa Shin, Kyung Hyune Rhee. 311-321 [doi]
- Real-Time Implementation of Broadcast Switching System Using Audio WatermarkJong-Weon Kim, Dong-Hwan Shin, Jong-Uk Choi. 322-331 [doi]
- Enforcing Regional DRM for Multimedia Broadcasts With and Without Trusted ComputingUlrich Greveler. 332-340 [doi]
- A DRM System Supporting What You See Is What You PayBin B. Zhu, Yang Yang, Tierui Chen. 341-355 [doi]