default search action
Digital Rights Management Workshop 2008: Alexandria, VA, USA
- Gregory L. Heileman, Marc Joye:
Proceedings of the 8th ACM Workshop on Digital Rights Management, Alexandria, VA, USA, October 27, 2008. ACM 2008, ISBN 978-1-60558-290-0
Traitor tracing
- Hongxia Jin, Jeffrey B. Lotspiech, Michael J. Nelson, Nimrod Megiddo:
Adaptive traitor tracing for large anonymous attack. 1-8 - Aggelos Kiayias, Moti Yung:
Public-key traitor tracing from efficient decoding and unbounded enrollment: extended abstract. 9-18
Models for rights and interoperability
- Eric Diehl:
A four-layer model for security of digital rights management. 19-28 - Pramod A. Jamkhedkar, Gregory L. Heileman:
A formal conceptual model for rights. 29-38 - Gwenaël J. Doërr, Ton Kalker:
Design rules for interoperable domains: controlling content dilution and content sharing. 39-50 - Yacov Yacobi:
Content identification. 51-52 - Yacov Yacobi, Gideon Yaniv:
Counterfeiting and anti-counterfeitingof software and content. 53-58
Applications
- Varad Kirtane, C. Pandu Rangan:
RSA-TBOS signcryption with proxy re-encryption. 59-66 - Avinash L. Varna, Ashwin Swaminathan, Min Wu:
A decision theoretic framework for analyzing binary hash-based content identification systems. 67-76
Implementation and legislation
- Anja Becker, Alapan Arnab, Mercè Serra:
Assessing privacy criteria for drm using eu privacy legislation. 77-86 - Srijith Krishnan Nair, Andrew S. Tanenbaum, Gabriela Gheorghe, Bruno Crispo:
Enforcing DRM policies across applications. 87-94
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.