default search action
Digital Rights Management Workshop 2002: Washington, DC, USA
- Joan Feigenbaum:
Security and Privacy in Digital Rights Management, ACM CCS-9 Workshop, DRM 2002, Washington, DC, USA, November 18, 2002, Revised Papers. Lecture Notes in Computer Science 2696, Springer 2003, ISBN 3-540-40410-4 - Stanley Chow, Philip A. Eisen, Harold Johnson, Paul C. van Oorschot:
A White-Box DES Implementation for DRM Applications. 1-15 - Matthias Jacob, Dan Boneh, Edward W. Felten:
Attacking an Obfuscated Cipher by Injecting Faults. 16-31 - Aggelos Kiayias, Moti Yung:
Breaking and Repairing Asymmetric Public-Key Traitor Tracing. 32-50 - Brian A. LaMacchia:
Key Challenges in DRM: An Industry Perspective. 51-60 - Yevgeniy Dodis, Nelly Fazio:
Public Key Broadcast Encryption for Stateless Receivers. 61-80 - Reihaneh Safavi-Naini, Yejing Wang:
Traitor Tracing for Shortened and Corrupted Fingerprints. 81-100 - John A. Halderman:
Evaluating New Copy-Prevention Techniques for Audio CDs. 101-117 - Larry Korba, Steve Kenny:
Towards Meeting the Privacy Challenge: Adapting DRM. 118-136 - Deirdre K. Mulligan, Aaron J. Burstein:
Implementing Copyright Limitations in Rights Expression Languages. 137-154 - Peter Biddle, Paul England, Marcus Peinado, Bryan Willman:
The Darknet and the Future of Content Protection. 155-176 - Darko Kirovski, Fabien A. P. Petitcolas:
Replacement Attack on Arbitrary Watermarking Systems. 177-189 - Robert Johnson, Jessica Staddon:
FAIR: Fair Audience InfeRence. 190-207 - Alexandra Boldyreva, Markus Jakobsson:
Theft-Protected Proprietary Certificates. 208-220
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.