default search action
Digital Rights Management Workshop 2009: Chicago, Illinois, USA
- Ehab Al-Shaer, Hongxia Jin, Gregory L. Heileman:
Proceedings of the 9th ACM Workshop on Digital Rights Management, Chicago, Illinois, USA, November 9, 2009. ACM 2009, ISBN 978-1-60558-779-0
Cryptographic techniques and formal models
- Aggelos Kiayias, Serdar Pehlivanoglu:
On the security of a public-key traitor tracing scheme with sublinear ciphertext size. 1-10 - Davide Alessio, Marc Joye:
A simple construction for public-key encryption with revocable anonymity: the honest-sender case. 11-16 - Nicholas Paul Sheppard, Reihaneh Safavi-Naini:
On the operational semantics of rights expression languages. 17-28
Experience
- Sye Loong Keoh, Koen Vrielink:
An implementation experience of domain management in marlin. 29-38 - Jeffrey B. Lotspiech:
Broadcast encryption versus public key cryptography in content protection systems. 39-46
Software protection
- Srivatsan Narayanan, Ananth Raghunathan, Ramarathnam Venkatesan:
Obfuscating straight line arithmetic programs. 47-58 - Changjiang Zhang, Jianmin Wang, Clark D. Thomborson, Chaokun Wang, Christian S. Collberg:
A semi-dynamic multiple watermarking schemefor java applications. 59-72
Architecture
- Amit Sachan, Sabu Emmanuel, Mohan S. Kankanhalli:
Efficient license validation in MPML DRM architecture. 73-82 - Juan Ramón Troncoso-Pastoriza, Pedro Comesaña, Luis Pérez-Freire, Fernando Pérez-González:
Videosurveillance and privacy: covering the two sides of the mirror with DRM. 83-94
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.