|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 21 occurrences of 20 keywords
|
|
|
Results
Found 27 publication records. Showing 27 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Reihaneh Safavi-Naini, Moti Yung (eds.) |
Digital Rights Management: Technologies, Issues, Challenges and Systems, First International Conference, DRMTICS 2005, Sydney, Australia, October 31 - November 2, 2005, Revised Selected Papers |
DRMTICS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Xiaoyun Wu, Xiaoping Liang, Hongmei Liu 0001, Jiwu Huang, Guoping Qiu |
Reversible Semi-fragile Image Authentication Using Zernike Moments and Integer Wavelet Transform. |
DRMTICS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Supriya Singh, Margaret Jackson, Jenny Waycott, Jenine P. Beekhuyzen |
Downloading vs Purchase: Music Industry vs Consumers. |
DRMTICS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Valery Pryamikov |
Call Tree Transformation for Program Obfuscation and Copy Protection. |
DRMTICS |
2005 |
DBLP DOI BibTeX RDF |
Software Copy Protection, Software Watermarking, Software Obfuscation |
1 | Kailash Bhoopalam, Kurt Maly, Ravi Mukkamala, Mohammad Zubair, D. Agrawal, David Kaminsky |
A Comparative Study of Specification Models for Autonomic Access Control of Digital Rights. |
DRMTICS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Jacques J. A. Fournier, Simon W. Moore |
A Vector Approach to Cryptography Implementation. |
DRMTICS |
2005 |
DBLP DOI BibTeX RDF |
Cryptography, AES, RSA, vector architecture, Montgomery Modular Multiplication |
1 | Ulrich Greveler |
Enforcing Regional DRM for Multimedia Broadcasts With and Without Trusted Computing. |
DRMTICS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | William Zhu 0001, Clark D. Thomborson |
Algorithms to Watermark Software Through Register Allocation. |
DRMTICS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | André Adelsbach, Ulrich Greveler |
A Broadcast Encryption Scheme with Free-Riders but Unconditional Security. |
DRMTICS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Takaaki Mizuki, Satoshi Nounin, Hideaki Sone, Yousuke Toyota |
Worst-Case Optimal Fingerprinting Codes for Non-threshold Collusion. |
DRMTICS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Mahadevan Gomathisankaran, Akhilesh Tyagi |
TIVA: Trusted Integrity Verification Architecture. |
DRMTICS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai |
Security Weaknesses of Certain Broadcast Encryption Schemes. |
DRMTICS |
2005 |
DBLP DOI BibTeX RDF |
time-memory-data trade-off, cryptanalysis, key management, broadcast encryption |
1 | Milan Petkovic, R. Paul Koster |
User-Attributed Rights in DRM. |
DRMTICS |
2005 |
DBLP DOI BibTeX RDF |
user-attributed rights, delegation, Digital Rights Management (DRM) |
1 | Yanjun Hu, Xiaoping Ma, Linming Dou, Ying Chen |
The Effect of Fidelity Measure Functions on the Capacity of Digital Watermarks. |
DRMTICS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Hongmei Liu 0001, Fenglian Shao, Jiwu Huang |
A MPEG-2 Video Watermarking Algorithm with Compensation in Bit Stream. |
DRMTICS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Brian Fitzgerald 0002 |
The Australian Sony PlayStation Case: How Far Will Anti-circumvention Law Reach in the Name of DRM? |
DRMTICS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Ying Sha |
AVS-REL - A New Right Expression Language. |
DRMTICS |
2005 |
DBLP DOI BibTeX RDF |
AVS-REL, AVS, REL |
1 | Jong-Weon Kim, Dong-Hwan Shin, Jong-Uk Choi |
Real-Time Implementation of Broadcast Switching System Using Audio Watermark. |
DRMTICS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Taehae Kim, Yongwha Chung, Seunghwan Jung, Daesung Moon |
Secure Remote Fingerprint Verification Using Dual Watermarks. |
DRMTICS |
2005 |
DBLP DOI BibTeX RDF |
Dual Watermarking, Biometrics, User Authentication, Fingerprint Verification |
1 | Bin B. Zhu, Yang Yang, Tierui Chen |
A DRM System Supporting What You See Is What You Pay. |
DRMTICS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai |
A Novel Broadcast Encryption Based on Time-Bound Cryptographic Keys. |
DRMTICS |
2005 |
DBLP DOI BibTeX RDF |
time-limited services, cryptographic keys management, time-bound keys, one-way mappings, broadcast encryption, pseudorandom number generators |
1 | Xiaoming Wang, Bin B. Zhu, Shipeng Li 0001 |
A Novel Privacy and Copyright Protection Enforced Peer-to-Peer Network. |
DRMTICS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Seunglim Yong, Sang-Ho Lee |
An Efficient Fingerprinting Scheme with Secret Sharing. |
DRMTICS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Brian Blietz, Akhilesh Tyagi |
Software Tamper Resistance Through Dynamic Program Monitoring. |
DRMTICS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Youngho Park 0004, Jung-Hwa Shin, Kyung Hyune Rhee |
Design of a Secure Digital Contents Delivery System in P2P Networks. |
DRMTICS |
2005 |
DBLP DOI BibTeX RDF |
Escrow Service, Key Issuing, P2P, Contents Distribution |
1 | Yee Fen Lim |
Digital Rights Management: Merging Contract, Copyright and Criminal Law. |
DRMTICS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Yu-Quan Zhang, Sabu Emmanuel |
A Novel Framework for Multiple Creatorship Protection of Digital Movies. |
DRMTICS |
2005 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #27 of 27 (100 per page; Change: )
|
|