default search action
Search dblp for Publications
export results for "stream:conf/drm:"
@inproceedings{DBLP:conf/drm/Boyden11, author = {Bruce E. Boyden}, editor = {Yan Chen and Stefan Katzenbeisser and Ahmad{-}Reza Sadeghi}, title = {Is {DRM} working?: how could we tell?}, booktitle = {Proceedings of the 11th {ACM} Workshop on Digital Rights Management, Chicago, Illinois, USA, October 21, 2011}, pages = {1--2}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046631.2046633}, doi = {10.1145/2046631.2046633}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/Boyden11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/JafariSS11, author = {Mohammad Jafari and Reihaneh Safavi{-}Naini and Nicholas Paul Sheppard}, editor = {Yan Chen and Stefan Katzenbeisser and Ahmad{-}Reza Sadeghi}, title = {A rights management approach to protection of privacy in a cloud of electronic health records}, booktitle = {Proceedings of the 11th {ACM} Workshop on Digital Rights Management, Chicago, Illinois, USA, October 21, 2011}, pages = {23--30}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046631.2046637}, doi = {10.1145/2046631.2046637}, timestamp = {Wed, 30 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/JafariSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/JoyeL11, author = {Marc Joye and Tancr{\`{e}}de Lepoint}, editor = {Yan Chen and Stefan Katzenbeisser and Ahmad{-}Reza Sadeghi}, title = {Traitor tracing schemes for protected software implementations}, booktitle = {Proceedings of the 11th {ACM} Workshop on Digital Rights Management, Chicago, Illinois, USA, October 21, 2011}, pages = {15--22}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046631.2046636}, doi = {10.1145/2046631.2046636}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/JoyeL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/KirovskiM11, author = {Darko Kirovski and Christopher Meek}, editor = {Yan Chen and Stefan Katzenbeisser and Ahmad{-}Reza Sadeghi}, title = {Tunneled {TLS} for multi-factor authentication}, booktitle = {Proceedings of the 11th {ACM} Workshop on Digital Rights Management, Chicago, Illinois, USA, October 21, 2011}, pages = {31--40}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046631.2046639}, doi = {10.1145/2046631.2046639}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/KirovskiM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/LambJBNH11, author = {Christopher C. Lamb and Pramod A. Jamkhedkar and Mathew P. Bohnsack and Viswanath Nandina and Gregory L. Heileman}, editor = {Yan Chen and Stefan Katzenbeisser and Ahmad{-}Reza Sadeghi}, title = {A domain specific language for usage management}, booktitle = {Proceedings of the 11th {ACM} Workshop on Digital Rights Management, Chicago, Illinois, USA, October 21, 2011}, pages = {51--62}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046631.2046641}, doi = {10.1145/2046631.2046641}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/LambJBNH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/SchaferBS11, author = {Marcel Sch{\"{a}}fer and Waldemar Berchtold and Martin Steinebach}, editor = {Yan Chen and Stefan Katzenbeisser and Ahmad{-}Reza Sadeghi}, title = {Fast and adaptive tracing strategies for 3-secure fingerprint watermarking codes}, booktitle = {Proceedings of the 11th {ACM} Workshop on Digital Rights Management, Chicago, Illinois, USA, October 21, 2011}, pages = {41--50}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046631.2046640}, doi = {10.1145/2046631.2046640}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/SchaferBS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/WeiKP11, author = {Sheng Wei and Farinaz Koushanfar and Miodrag Potkonjak}, editor = {Yan Chen and Stefan Katzenbeisser and Ahmad{-}Reza Sadeghi}, title = {Integrated circuit digital rights management techniques using physical level characterization}, booktitle = {Proceedings of the 11th {ACM} Workshop on Digital Rights Management, Chicago, Illinois, USA, October 21, 2011}, pages = {3--14}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046631.2046635}, doi = {10.1145/2046631.2046635}, timestamp = {Fri, 04 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/WeiKP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/drm/2011, editor = {Yan Chen and Stefan Katzenbeisser and Ahmad{-}Reza Sadeghi}, title = {Proceedings of the 11th {ACM} Workshop on Digital Rights Management, Chicago, Illinois, USA, October 21, 2011}, publisher = {{ACM}}, year = {2011}, url = {http://dl.acm.org/citation.cfm?id=2046631}, isbn = {978-1-4503-1005-5}, timestamp = {Tue, 16 Dec 2014 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/BonehKM10, author = {Dan Boneh and Aggelos Kiayias and Hart William Montgomery}, editor = {Ehab Al{-}Shaer and Hongxia Jin and Marc Joye}, title = {Robust fingerprinting codes: a near optimal construction}, booktitle = {Proceedings of the 10th {ACM} Workshop on Digital Rights Management, Chicago, Illinois, USA, October 4, 2010}, pages = {3--12}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866870.1866873}, doi = {10.1145/1866870.1866873}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/BonehKM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/CappaertP10, author = {Jan Cappaert and Bart Preneel}, editor = {Ehab Al{-}Shaer and Hongxia Jin and Marc Joye}, title = {A general model for hiding control flow}, booktitle = {Proceedings of the 10th {ACM} Workshop on Digital Rights Management, Chicago, Illinois, USA, October 4, 2010}, pages = {35--42}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866870.1866877}, doi = {10.1145/1866870.1866877}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/CappaertP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/ChangFX10, author = {Ee{-}Chien Chang and Chengfang Fang and Jia Xu}, editor = {Ehab Al{-}Shaer and Hongxia Jin and Marc Joye}, title = {A chameleon encryption scheme resistant to known-plaintext attack}, booktitle = {Proceedings of the 10th {ACM} Workshop on Digital Rights Management, Chicago, Illinois, USA, October 4, 2010}, pages = {25--34}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866870.1866876}, doi = {10.1145/1866870.1866876}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/ChangFX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/DiehlR10, author = {Eric Diehl and Arnaud Robert}, editor = {Ehab Al{-}Shaer and Hongxia Jin and Marc Joye}, title = {An introduction to interoperable digital rights locker}, booktitle = {Proceedings of the 10th {ACM} Workshop on Digital Rights Management, Chicago, Illinois, USA, October 4, 2010}, pages = {51--54}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866870.1866881}, doi = {10.1145/1866870.1866881}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/DiehlR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/FujitaT10, author = {Kunihiko Fujita and Yasuyuki Tsukada}, editor = {Ehab Al{-}Shaer and Hongxia Jin and Marc Joye}, title = {An analysis of interoperability between licenses}, booktitle = {Proceedings of the 10th {ACM} Workshop on Digital Rights Management, Chicago, Illinois, USA, October 4, 2010}, pages = {61--72}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866870.1866884}, doi = {10.1145/1866870.1866884}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/FujitaT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/GowadiaSLSO10, author = {Vaibhav Gowadia and Enrico Scalavino and Emil C. Lupu and Dmitry Starostin and Alexey Orlov}, editor = {Ehab Al{-}Shaer and Hongxia Jin and Marc Joye}, title = {Secure cross-domain data sharing architecture for crisis management}, booktitle = {Proceedings of the 10th {ACM} Workshop on Digital Rights Management, Chicago, Illinois, USA, October 4, 2010}, pages = {43--46}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866870.1866879}, doi = {10.1145/1866870.1866879}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/GowadiaSLSO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/JafariSSS10, author = {Mohammad Jafari and Reihaneh Safavi{-}Naini and Chad Saunders and Nicholas Paul Sheppard}, editor = {Ehab Al{-}Shaer and Hongxia Jin and Marc Joye}, title = {Using digital rights management for securing data in a medical research environment}, booktitle = {Proceedings of the 10th {ACM} Workshop on Digital Rights Management, Chicago, Illinois, USA, October 4, 2010}, pages = {55--60}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866870.1866883}, doi = {10.1145/1866870.1866883}, timestamp = {Wed, 30 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/JafariSSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/JamkhedkarHL10, author = {Pramod A. Jamkhedkar and Gregory L. Heileman and Chris C. Lamb}, editor = {Ehab Al{-}Shaer and Hongxia Jin and Marc Joye}, title = {An interoperable usage management framework}, booktitle = {Proceedings of the 10th {ACM} Workshop on Digital Rights Management, Chicago, Illinois, USA, October 4, 2010}, pages = {73--88}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866870.1866885}, doi = {10.1145/1866870.1866885}, timestamp = {Tue, 06 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/JamkhedkarHL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/JunodK10, author = {Pascal Junod and Alexandre Karlov}, editor = {Ehab Al{-}Shaer and Hongxia Jin and Marc Joye}, title = {An efficient public-key attribute-based broadcast encryption scheme allowing arbitrary access policies}, booktitle = {Proceedings of the 10th {ACM} Workshop on Digital Rights Management, Chicago, Illinois, USA, October 4, 2010}, pages = {13--24}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866870.1866875}, doi = {10.1145/1866870.1866875}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/JunodK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/LuoHC10, author = {Song Luo and Jian{-}bin Hu and Zhong Chen}, editor = {Ehab Al{-}Shaer and Hongxia Jin and Marc Joye}, title = {New construction of identity-based proxy re-encryption}, booktitle = {Proceedings of the 10th {ACM} Workshop on Digital Rights Management, Chicago, Illinois, USA, October 4, 2010}, pages = {47--50}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866870.1866880}, doi = {10.1145/1866870.1866880}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/LuoHC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/Naor10, author = {Moni Naor}, editor = {Ehab Al{-}Shaer and Hongxia Jin and Marc Joye}, title = {The privacy of tracing traitors}, booktitle = {Proceedings of the 10th {ACM} Workshop on Digital Rights Management, Chicago, Illinois, USA, October 4, 2010}, pages = {1--2}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866870.1866871}, doi = {10.1145/1866870.1866871}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/Naor10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/drm/2010, editor = {Ehab Al{-}Shaer and Hongxia Jin and Marc Joye}, title = {Proceedings of the 10th {ACM} Workshop on Digital Rights Management, Chicago, Illinois, USA, October 4, 2010}, publisher = {{ACM}}, year = {2010}, url = {http://dl.acm.org/citation.cfm?id=1866870}, isbn = {978-1-4503-0091-9}, timestamp = {Wed, 28 Mar 2012 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/AlessioJ09, author = {Davide Alessio and Marc Joye}, editor = {Ehab Al{-}Shaer and Hongxia Jin and Gregory L. Heileman}, title = {A simple construction for public-key encryption with revocable anonymity: the honest-sender case}, booktitle = {Proceedings of the 9th {ACM} Workshop on Digital Rights Management, Chicago, Illinois, USA, November 9, 2009}, pages = {11--16}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1655048.1655051}, doi = {10.1145/1655048.1655051}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/AlessioJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/KeohV09, author = {Sye Loong Keoh and Koen Vrielink}, editor = {Ehab Al{-}Shaer and Hongxia Jin and Gregory L. Heileman}, title = {An implementation experience of domain management in marlin}, booktitle = {Proceedings of the 9th {ACM} Workshop on Digital Rights Management, Chicago, Illinois, USA, November 9, 2009}, pages = {29--38}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1655048.1655054}, doi = {10.1145/1655048.1655054}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/KeohV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/KiayiasP09, author = {Aggelos Kiayias and Serdar Pehlivanoglu}, editor = {Ehab Al{-}Shaer and Hongxia Jin and Gregory L. Heileman}, title = {On the security of a public-key traitor tracing scheme with sublinear ciphertext size}, booktitle = {Proceedings of the 9th {ACM} Workshop on Digital Rights Management, Chicago, Illinois, USA, November 9, 2009}, pages = {1--10}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1655048.1655050}, doi = {10.1145/1655048.1655050}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/KiayiasP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/Lotspiech09, author = {Jeffrey B. Lotspiech}, editor = {Ehab Al{-}Shaer and Hongxia Jin and Gregory L. Heileman}, title = {Broadcast encryption versus public key cryptography in content protection systems}, booktitle = {Proceedings of the 9th {ACM} Workshop on Digital Rights Management, Chicago, Illinois, USA, November 9, 2009}, pages = {39--46}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1655048.1655055}, doi = {10.1145/1655048.1655055}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/Lotspiech09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/NarayananRV09, author = {Srivatsan Narayanan and Ananth Raghunathan and Ramarathnam Venkatesan}, editor = {Ehab Al{-}Shaer and Hongxia Jin and Gregory L. Heileman}, title = {Obfuscating straight line arithmetic programs}, booktitle = {Proceedings of the 9th {ACM} Workshop on Digital Rights Management, Chicago, Illinois, USA, November 9, 2009}, pages = {47--58}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1655048.1655057}, doi = {10.1145/1655048.1655057}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/NarayananRV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/SachanEK09, author = {Amit Sachan and Sabu Emmanuel and Mohan S. Kankanhalli}, editor = {Ehab Al{-}Shaer and Hongxia Jin and Gregory L. Heileman}, title = {Efficient license validation in {MPML} {DRM} architecture}, booktitle = {Proceedings of the 9th {ACM} Workshop on Digital Rights Management, Chicago, Illinois, USA, November 9, 2009}, pages = {73--82}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1655048.1655060}, doi = {10.1145/1655048.1655060}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/SachanEK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/SheppardS09, author = {Nicholas Paul Sheppard and Reihaneh Safavi{-}Naini}, editor = {Ehab Al{-}Shaer and Hongxia Jin and Gregory L. Heileman}, title = {On the operational semantics of rights expression languages}, booktitle = {Proceedings of the 9th {ACM} Workshop on Digital Rights Management, Chicago, Illinois, USA, November 9, 2009}, pages = {17--28}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1655048.1655052}, doi = {10.1145/1655048.1655052}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/SheppardS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/Troncoso-PastorizaCPP09, author = {Juan Ram{\'{o}}n Troncoso{-}Pastoriza and Pedro Comesa{\~{n}}a and Luis P{\'{e}}rez{-}Freire and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez}, editor = {Ehab Al{-}Shaer and Hongxia Jin and Gregory L. Heileman}, title = {Videosurveillance and privacy: covering the two sides of the mirror with {DRM}}, booktitle = {Proceedings of the 9th {ACM} Workshop on Digital Rights Management, Chicago, Illinois, USA, November 9, 2009}, pages = {83--94}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1655048.1655061}, doi = {10.1145/1655048.1655061}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/Troncoso-PastorizaCPP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/ZhangWTWC09, author = {Changjiang Zhang and Jianmin Wang and Clark D. Thomborson and Chaokun Wang and Christian S. Collberg}, editor = {Ehab Al{-}Shaer and Hongxia Jin and Gregory L. Heileman}, title = {A semi-dynamic multiple watermarking schemefor java applications}, booktitle = {Proceedings of the 9th {ACM} Workshop on Digital Rights Management, Chicago, Illinois, USA, November 9, 2009}, pages = {59--72}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1655048.1655058}, doi = {10.1145/1655048.1655058}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/ZhangWTWC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/drm/2009, editor = {Ehab Al{-}Shaer and Hongxia Jin and Gregory L. Heileman}, title = {Proceedings of the 9th {ACM} Workshop on Digital Rights Management, Chicago, Illinois, USA, November 9, 2009}, publisher = {{ACM}}, year = {2009}, isbn = {978-1-60558-779-0}, timestamp = {Wed, 25 Nov 2009 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/BeckerAS08, author = {Anja Becker and Alapan Arnab and Merc{\`{e}} Serra}, editor = {Gregory L. Heileman and Marc Joye}, title = {Assessing privacy criteria for drm using eu privacy legislation}, booktitle = {Proceedings of the 8th {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, October 27, 2008}, pages = {77--86}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456520.1456534}, doi = {10.1145/1456520.1456534}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/BeckerAS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/Diehl08, author = {Eric Diehl}, editor = {Gregory L. Heileman and Marc Joye}, title = {A four-layer model for security of digital rights management}, booktitle = {Proceedings of the 8th {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, October 27, 2008}, pages = {19--28}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456520.1456527}, doi = {10.1145/1456520.1456527}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/Diehl08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/DoerrK08, author = {Gwena{\"{e}}l J. Do{\"{e}}rr and Ton Kalker}, editor = {Gregory L. Heileman and Marc Joye}, title = {Design rules for interoperable domains: controlling content dilution and content sharing}, booktitle = {Proceedings of the 8th {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, October 27, 2008}, pages = {39--50}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456520.1456529}, doi = {10.1145/1456520.1456529}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/DoerrK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/JamkhedkarH08, author = {Pramod A. Jamkhedkar and Gregory L. Heileman}, editor = {Gregory L. Heileman and Marc Joye}, title = {A formal conceptual model for rights}, booktitle = {Proceedings of the 8th {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, October 27, 2008}, pages = {29--38}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456520.1456528}, doi = {10.1145/1456520.1456528}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/JamkhedkarH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/JinLNM08, author = {Hongxia Jin and Jeffrey B. Lotspiech and Michael J. Nelson and Nimrod Megiddo}, editor = {Gregory L. Heileman and Marc Joye}, title = {Adaptive traitor tracing for large anonymous attack}, booktitle = {Proceedings of the 8th {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, October 27, 2008}, pages = {1--8}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456520.1456524}, doi = {10.1145/1456520.1456524}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/JinLNM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/KiayiasY08, author = {Aggelos Kiayias and Moti Yung}, editor = {Gregory L. Heileman and Marc Joye}, title = {Public-key traitor tracing from efficient decoding and unbounded enrollment: extended abstract}, booktitle = {Proceedings of the 8th {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, October 27, 2008}, pages = {9--18}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456520.1456525}, doi = {10.1145/1456520.1456525}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/KiayiasY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/KirtaneR08, author = {Varad Kirtane and C. Pandu Rangan}, editor = {Gregory L. Heileman and Marc Joye}, title = {{RSA-TBOS} signcryption with proxy re-encryption}, booktitle = {Proceedings of the 8th {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, October 27, 2008}, pages = {59--66}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456520.1456531}, doi = {10.1145/1456520.1456531}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/KirtaneR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/NairTGC08, author = {Srijith Krishnan Nair and Andrew S. Tanenbaum and Gabriela Gheorghe and Bruno Crispo}, editor = {Gregory L. Heileman and Marc Joye}, title = {Enforcing {DRM} policies across applications}, booktitle = {Proceedings of the 8th {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, October 27, 2008}, pages = {87--94}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456520.1456535}, doi = {10.1145/1456520.1456535}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/NairTGC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/VarnaSW08, author = {Avinash L. Varna and Ashwin Swaminathan and Min Wu}, editor = {Gregory L. Heileman and Marc Joye}, title = {A decision theoretic framework for analyzing binary hash-based content identification systems}, booktitle = {Proceedings of the 8th {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, October 27, 2008}, pages = {67--76}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456520.1456532}, doi = {10.1145/1456520.1456532}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/VarnaSW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/Yacobi08, author = {Yacov Yacobi}, editor = {Gregory L. Heileman and Marc Joye}, title = {Content identification}, booktitle = {Proceedings of the 8th {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, October 27, 2008}, pages = {51--52}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456520.1456521}, doi = {10.1145/1456520.1456521}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/Yacobi08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/YacobiY08, author = {Yacov Yacobi and Gideon Yaniv}, editor = {Gregory L. Heileman and Marc Joye}, title = {Counterfeiting and anti-counterfeitingof software and content}, booktitle = {Proceedings of the 8th {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, October 27, 2008}, pages = {53--58}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456520.1456522}, doi = {10.1145/1456520.1456522}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/YacobiY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/drm/2008, editor = {Gregory L. Heileman and Marc Joye}, title = {Proceedings of the 8th {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, October 27, 2008}, publisher = {{ACM}}, year = {2008}, isbn = {978-1-60558-290-0}, timestamp = {Tue, 11 Nov 2008 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/ArnabH07, author = {Alapan Arnab and Andrew Hutchison}, editor = {Moti Yung and Aggelos Kiayias and Ahmad{-}Reza Sadeghi}, title = {Persistent access control: a formal model for {DRM}}, booktitle = {Proceedings of the Seventh {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, October 29, 2007}, pages = {41--53}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1314276.1314286}, doi = {10.1145/1314276.1314286}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/ArnabH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/BenadjilaBF07, author = {Ryad Benadjila and Olivier Billet and Stanislas Francfort}, editor = {Moti Yung and Aggelos Kiayias and Ahmad{-}Reza Sadeghi}, title = {Drm to counter side-channel attacks?}, booktitle = {Proceedings of the Seventh {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, October 29, 2007}, pages = {23--32}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1314276.1314282}, doi = {10.1145/1314276.1314282}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/BenadjilaBF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/HeilemanJKH07, author = {Gregory L. Heileman and Pramod A. Jamkhedkar and Joud S. Khoury and Curtis J. Hrncir}, editor = {Moti Yung and Aggelos Kiayias and Ahmad{-}Reza Sadeghi}, title = {The drm game}, booktitle = {Proceedings of the Seventh {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, October 29, 2007}, pages = {54--62}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1314276.1314287}, doi = {10.1145/1314276.1314287}, timestamp = {Mon, 06 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/HeilemanJKH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/JakubowskiV07, author = {Mariusz H. Jakubowski and Ramarathnam Venkatesan}, editor = {Moti Yung and Aggelos Kiayias and Ahmad{-}Reza Sadeghi}, title = {Randomized radon transforms for biometric authentication via fingerprint hashing}, booktitle = {Proceedings of the Seventh {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, October 29, 2007}, pages = {90--94}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1314276.1314293}, doi = {10.1145/1314276.1314293}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/JakubowskiV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/KirkelsMR07, author = {Bart Kirkels and Martijn Maas and Peter Roelse}, editor = {Moti Yung and Aggelos Kiayias and Ahmad{-}Reza Sadeghi}, title = {A security architecture for pay-per-view business models in conditional access systems}, booktitle = {Proceedings of the Seventh {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, October 29, 2007}, pages = {1--9}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1314276.1314279}, doi = {10.1145/1314276.1314279}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/KirkelsMR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/MajumdarDT07, author = {Anirban Majumdar and Stephen Drape and Clark D. Thomborson}, editor = {Moti Yung and Aggelos Kiayias and Ahmad{-}Reza Sadeghi}, title = {Slicing obfuscations: design, correctness, and evaluation}, booktitle = {Proceedings of the Seventh {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, October 29, 2007}, pages = {70--81}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1314276.1314290}, doi = {10.1145/1314276.1314290}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/MajumdarDT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/MichielsG07, author = {Wil Michiels and Paul Gorissen}, editor = {Moti Yung and Aggelos Kiayias and Ahmad{-}Reza Sadeghi}, title = {Mechanism for software tamper resistance: an application of white-box cryptography}, booktitle = {Proceedings of the Seventh {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, October 29, 2007}, pages = {82--89}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1314276.1314291}, doi = {10.1145/1314276.1314291}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/MichielsG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/Odlyzko07, author = {Andrew M. Odlyzko}, editor = {Moti Yung and Aggelos Kiayias and Ahmad{-}Reza Sadeghi}, title = {Digital rights management: desirable, inevitable, and almost irrelevant}, booktitle = {Proceedings of the Seventh {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, October 29, 2007}, pages = {39--40}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1314276.1314277}, doi = {10.1145/1314276.1314277}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/Odlyzko07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/Sheppard07, author = {Nicholas Paul Sheppard}, editor = {Moti Yung and Aggelos Kiayias and Ahmad{-}Reza Sadeghi}, title = {On implementing mpeg-21 intellectual property management and protection}, booktitle = {Proceedings of the Seventh {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, October 29, 2007}, pages = {10--22}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1314276.1314280}, doi = {10.1145/1314276.1314280}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/Sheppard07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/VaradarajanVR07, author = {Avinash V. Varadarajan and Ramarathnam Venkatesan and C. Pandu Rangan}, editor = {Moti Yung and Aggelos Kiayias and Ahmad{-}Reza Sadeghi}, title = {Data structures for limited oblivious execution of programs while preserving locality of reference}, booktitle = {Proceedings of the Seventh {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, October 29, 2007}, pages = {63--69}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1314276.1314289}, doi = {10.1145/1314276.1314289}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/VaradarajanVR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/Xie07, author = {Huijia Xie}, editor = {Moti Yung and Aggelos Kiayias and Ahmad{-}Reza Sadeghi}, title = {Protecting fair use from digital rights management in china}, booktitle = {Proceedings of the Seventh {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, October 29, 2007}, pages = {33--38}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1314276.1314284}, doi = {10.1145/1314276.1314284}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/Xie07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/drm/2007, editor = {Moti Yung and Aggelos Kiayias and Ahmad{-}Reza Sadeghi}, title = {Proceedings of the Seventh {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, October 29, 2007}, publisher = {{ACM}}, year = {2007}, isbn = {978-1-59593-884-8}, timestamp = {Thu, 17 Jan 2008 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/AnckaertJV06, author = {Bertrand Anckaert and Mariusz H. Jakubowski and Ramarathnam Venkatesan}, editor = {Moti Yung and Kaoru Kurosawa and Reihaneh Safavi{-}Naini}, title = {Proteus: virtualization for diversified tamper-resistance}, booktitle = {Proceedings of the Sixth {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, October 30, 2006}, pages = {47--58}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1179509.1179521}, doi = {10.1145/1179509.1179521}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/AnckaertJV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/ArnabH06, author = {Alapan Arnab and Andrew Hutchison}, editor = {Moti Yung and Kaoru Kurosawa and Reihaneh Safavi{-}Naini}, title = {Verifiable digital object identity system}, booktitle = {Proceedings of the Sixth {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, October 30, 2006}, pages = {19--26}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1179509.1179514}, doi = {10.1145/1179509.1179514}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/ArnabH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/BordersZP06, author = {Kevin Borders and Xin Zhao and Atul Prakash}, editor = {Moti Yung and Kaoru Kurosawa and Reihaneh Safavi{-}Naini}, title = {Securing sensitive content in a view-only file system}, booktitle = {Proceedings of the Sixth {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, October 30, 2006}, pages = {27--36}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1179509.1179515}, doi = {10.1145/1179509.1179515}, timestamp = {Thu, 19 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/BordersZP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/ChongD06, author = {Daniel J. T. Chong and Robert H. Deng}, editor = {Moti Yung and Kaoru Kurosawa and Reihaneh Safavi{-}Naini}, title = {Privacy-enhanced superdistribution of layered content with trusted access control}, booktitle = {Proceedings of the Sixth {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, October 30, 2006}, pages = {37--44}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1179509.1179517}, doi = {10.1145/1179509.1179517}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/ChongD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/CooperM06, author = {Andrew Cooper and Andrew P. Martin}, editor = {Moti Yung and Kaoru Kurosawa and Reihaneh Safavi{-}Naini}, title = {Towards an open, trusted digital rights management platform}, booktitle = {Proceedings of the Sixth {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, October 30, 2006}, pages = {79--88}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1179509.1179525}, doi = {10.1145/1179509.1179525}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/CooperM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/Coria-MendozaNW06, author = {Lino Coria{-}Mendoza and Panos Nasiopoulos and Rabab Kreidieh Ward}, editor = {Moti Yung and Kaoru Kurosawa and Reihaneh Safavi{-}Naini}, title = {A robust content-dependent algorithm for video watermarking}, booktitle = {Proceedings of the Sixth {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, October 30, 2006}, pages = {97--101}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1179509.1179528}, doi = {10.1145/1179509.1179528}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/Coria-MendozaNW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/JamkhedkarHM06, author = {Pramod A. Jamkhedkar and Gregory L. Heileman and Iv{\'{a}}n Mart{\'{\i}}nez{-}Ortiz}, editor = {Moti Yung and Kaoru Kurosawa and Reihaneh Safavi{-}Naini}, title = {The problem with rights expression languages}, booktitle = {Proceedings of the Sixth {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, October 30, 2006}, pages = {59--68}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1179509.1179522}, doi = {10.1145/1179509.1179522}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/JamkhedkarHM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/Kalker06, author = {Ton Kalker}, editor = {Moti Yung and Kaoru Kurosawa and Reihaneh Safavi{-}Naini}, title = {On interoperability of {DRM}}, booktitle = {Proceedings of the Sixth {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, October 30, 2006}, pages = {45--46}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1179509.1179519}, doi = {10.1145/1179509.1179519}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/Kalker06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/KatzenbeisserKT06, author = {Stefan Katzenbeisser and Klaus Kursawe and Joop Talstra}, editor = {Moti Yung and Kaoru Kurosawa and Reihaneh Safavi{-}Naini}, title = {Graceful infringement reactions in {DRM} systems}, booktitle = {Proceedings of the Sixth {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, October 30, 2006}, pages = {89--96}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1179509.1179526}, doi = {10.1145/1179509.1179526}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/KatzenbeisserKT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/LandauST06, author = {Susan Landau and Ren{\'{e}}e Stratulate and Doug Twilleager}, editor = {Moti Yung and Kaoru Kurosawa and Reihaneh Safavi{-}Naini}, title = {Consumers, fans, and control: what the games industry can teach Hollywood about {DRM}}, booktitle = {Proceedings of the Sixth {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, October 30, 2006}, pages = {1--8}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1179509.1179511}, doi = {10.1145/1179509.1179511}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/LandauST06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/TabanCG06, author = {Gelareh Taban and Alvaro A. C{\'{a}}rdenas and Virgil D. Gligor}, editor = {Moti Yung and Kaoru Kurosawa and Reihaneh Safavi{-}Naini}, title = {Towards a secure and interoperable {DRM} architecture}, booktitle = {Proceedings of the Sixth {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, October 30, 2006}, pages = {69--78}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1179509.1179524}, doi = {10.1145/1179509.1179524}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/TabanCG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/TsaiCC06, author = {Janice Y. Tsai and Lorrie Faith Cranor and Scott Craver}, editor = {Moti Yung and Kaoru Kurosawa and Reihaneh Safavi{-}Naini}, title = {Vicarious infringement creates a privacy ceiling}, booktitle = {Proceedings of the Sixth {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, October 30, 2006}, pages = {9--18}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1179509.1179512}, doi = {10.1145/1179509.1179512}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/TsaiCC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/drm/2006, editor = {Moti Yung and Kaoru Kurosawa and Reihaneh Safavi{-}Naini}, title = {Proceedings of the Sixth {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, October 30, 2006}, publisher = {{ACM}}, year = {2006}, isbn = {1-59593-555-X}, timestamp = {Thu, 17 Jan 2008 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/AdelsbachRS05, author = {Andr{\'{e}} Adelsbach and Markus Rohe and Ahmad{-}Reza Sadeghi}, editor = {Reihaneh Safavi{-}Naini and Moti Yung}, title = {Towards multilateral secure digital rights distribution infrastructures}, booktitle = {Proceedings of the Fifth {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, November 7, 2005}, pages = {45--54}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102546.1102556}, doi = {10.1145/1102546.1102556}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/AdelsbachRS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/ArnabH05, author = {Alapan Arnab and Andrew Hutchison}, editor = {Reihaneh Safavi{-}Naini and Moti Yung}, title = {Fairer usage contracts for {DRM}}, booktitle = {Proceedings of the Fifth {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, November 7, 2005}, pages = {1--7}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102546.1102548}, doi = {10.1145/1102546.1102548}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/ArnabH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/GeCT05, author = {Jun Ge and Soma Chaudhuri and Akhilesh Tyagi}, editor = {Reihaneh Safavi{-}Naini and Moti Yung}, title = {Control flow based obfuscation}, booktitle = {Proceedings of the Fifth {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, November 7, 2005}, pages = {83--92}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102546.1102561}, doi = {10.1145/1102546.1102561}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/GeCT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/HeilemanJ05, author = {Gregory L. Heileman and Pramod A. Jamkhedkar}, editor = {Reihaneh Safavi{-}Naini and Moti Yung}, title = {{DRM} interoperability analysis from the perspective of a layered framework}, booktitle = {Proceedings of the Fifth {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, November 7, 2005}, pages = {17--26}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102546.1102551}, doi = {10.1145/1102546.1102551}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/HeilemanJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/JacksonSBW05, author = {Margaret Jackson and Supriya Singh and Jenine P. Beekhuyzen and Jennifer Waycott}, editor = {Reihaneh Safavi{-}Naini and Moti Yung}, title = {DRMs, fair use and users' experience of sharing music}, booktitle = {Proceedings of the Fifth {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, November 7, 2005}, pages = {8--16}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102546.1102549}, doi = {10.1145/1102546.1102549}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/JacksonSBW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/JhoYCK05, author = {Nam{-}Su Jho and Eun Sun Yoo and Jung Hee Cheon and Myung{-}Hwan Kim}, editor = {Reihaneh Safavi{-}Naini and Moti Yung}, title = {New broadcast encryption scheme using tree-based circle}, booktitle = {Proceedings of the Fifth {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, November 7, 2005}, pages = {37--44}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102546.1102554}, doi = {10.1145/1102546.1102554}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/JhoYCK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/KravitzM05, author = {David W. Kravitz and Thomas S. Messerges}, editor = {Reihaneh Safavi{-}Naini and Moti Yung}, title = {Achieving media portability through local content translation and end-to-end rights management}, booktitle = {Proceedings of the Fifth {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, November 7, 2005}, pages = {27--36}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102546.1102552}, doi = {10.1145/1102546.1102552}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/KravitzM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/MadouASB05, author = {Matias Madou and Bertrand Anckaert and Bjorn De Sutter and Koen De Bosschere}, editor = {Reihaneh Safavi{-}Naini and Moti Yung}, title = {Hybrid static-dynamic attacks against software protection mechanisms}, booktitle = {Proceedings of the Fifth {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, November 7, 2005}, pages = {75--82}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102546.1102560}, doi = {10.1145/1102546.1102560}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/MadouASB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/MalikKA05, author = {Hafiz Malik and Ashfaq A. Khokhar and Rashid Ansari}, editor = {Reihaneh Safavi{-}Naini and Moti Yung}, title = {Improved watermark detection for spread-spectrum based watermarking using independent component analysis}, booktitle = {Proceedings of the Fifth {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, November 7, 2005}, pages = {102--111}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102546.1102564}, doi = {10.1145/1102546.1102564}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/MalikKA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/Matheus05, author = {Andreas Matheus}, editor = {Reihaneh Safavi{-}Naini and Moti Yung}, title = {Authorization for digital rights management in the geospatial domain}, booktitle = {Proceedings of the Fifth {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, November 7, 2005}, pages = {55--64}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102546.1102557}, doi = {10.1145/1102546.1102557}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/Matheus05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/MichielsVJD05, author = {Sam Michiels and Kristof Verslype and Wouter Joosen and Bart De Decker}, editor = {Reihaneh Safavi{-}Naini and Moti Yung}, title = {Towards a software architecture for {DRM}}, booktitle = {Proceedings of the Fifth {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, November 7, 2005}, pages = {65--74}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102546.1102559}, doi = {10.1145/1102546.1102559}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/MichielsVJD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/QuanZ05, author = {Xiaomei Quan and Hongbin Zhang}, editor = {Reihaneh Safavi{-}Naini and Moti Yung}, title = {Statistical audio watermarking algorithm based on perceptual analysis}, booktitle = {Proceedings of the Fifth {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, November 7, 2005}, pages = {112--118}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102546.1102565}, doi = {10.1145/1102546.1102565}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/QuanZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/SencarM05, author = {Husrev T. Sencar and Nasir D. Memon}, editor = {Reihaneh Safavi{-}Naini and Moti Yung}, title = {Watermarking and ownership problem: a revisit}, booktitle = {Proceedings of the Fifth {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, November 7, 2005}, pages = {93--101}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102546.1102563}, doi = {10.1145/1102546.1102563}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/SencarM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/drm/2005, editor = {Reihaneh Safavi{-}Naini and Moti Yung}, title = {Proceedings of the Fifth {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, November 7, 2005}, publisher = {{ACM}}, year = {2005}, isbn = {1-59593-230-5}, timestamp = {Wed, 22 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/AnckaertSB04, author = {Bertrand Anckaert and Bjorn De Sutter and Koen De Bosschere}, editor = {Aggelos Kiayias and Moti Yung}, title = {Software piracy prevention through diversity}, booktitle = {Proceedings of the 2004 {ACM} Workshop on Digital Rights Management 2004, Washington, DC, USA, October 25, 2004}, pages = {63--71}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029146.1029157}, doi = {10.1145/1029146.1029157}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/AnckaertSB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/GhodkeF04, author = {Ninad Ghodke and Renato J. O. Figueiredo}, editor = {Aggelos Kiayias and Moti Yung}, title = {On the implications of machine virtualization for {DRM} and fair use: a case study of a virtual audio device driver}, booktitle = {Proceedings of the 2004 {ACM} Workshop on Digital Rights Management 2004, Washington, DC, USA, October 25, 2004}, pages = {91--98}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029146.1029162}, doi = {10.1145/1029146.1029162}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/GhodkeF04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/JamkhedkarH04, author = {Pramod A. Jamkhedkar and Gregory L. Heileman}, editor = {Aggelos Kiayias and Moti Yung}, title = {{DRM} as a layered system}, booktitle = {Proceedings of the 2004 {ACM} Workshop on Digital Rights Management 2004, Washington, DC, USA, October 25, 2004}, pages = {11--21}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029146.1029151}, doi = {10.1145/1029146.1029151}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/JamkhedkarH04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/JinLN04, author = {Hongxia Jin and Jeffery Lotspiech and Stefan Nusser}, editor = {Aggelos Kiayias and Moti Yung}, title = {Traitor tracing for prerecorded and recordable media}, booktitle = {Proceedings of the 2004 {ACM} Workshop on Digital Rights Management 2004, Washington, DC, USA, October 25, 2004}, pages = {83--90}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029146.1029160}, doi = {10.1145/1029146.1029160}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/JinLN04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/LiGJ04, author = {Yingjiu Li and Huiping Guo and Sushil Jajodia}, editor = {Aggelos Kiayias and Moti Yung}, title = {Tamper detection and localization for categorical data using fragile watermarks}, booktitle = {Proceedings of the 2004 {ACM} Workshop on Digital Rights Management 2004, Washington, DC, USA, October 25, 2004}, pages = {73--82}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029146.1029159}, doi = {10.1145/1029146.1029159}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/LiGJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/MargolinWL04, author = {N. Boris Margolin and Matthew K. Wright and Brian Neil Levine}, editor = {Aggelos Kiayias and Moti Yung}, title = {Analysis of an incentives-based secrets protection system}, booktitle = {Proceedings of the 2004 {ACM} Workshop on Digital Rights Management 2004, Washington, DC, USA, October 25, 2004}, pages = {22--30}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029146.1029153}, doi = {10.1145/1029146.1029153}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/MargolinWL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/PopescuCTK04, author = {Bogdan C. Popescu and Bruno Crispo and Andrew S. Tanenbaum and Frank Kamperman}, editor = {Aggelos Kiayias and Moti Yung}, title = {A {DRM} security architecture for home networks}, booktitle = {Proceedings of the 2004 {ACM} Workshop on Digital Rights Management 2004, Washington, DC, USA, October 25, 2004}, pages = {1--10}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029146.1029150}, doi = {10.1145/1029146.1029150}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/PopescuCTK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/RouvroySLQML04, author = {Ga{\"{e}}l Rouvroy and Fran{\c{c}}ois{-}Xavier Standaert and Fr{\'{e}}d{\'{e}}ric Lef{\`{e}}bvre and Jean{-}Jacques Quisquater and Beno{\^{\i}}t Macq and Jean{-}Didier Legat}, editor = {Aggelos Kiayias and Moti Yung}, title = {Reconfigurable hardware solutions for the digital rights management of digital cinema}, booktitle = {Proceedings of the 2004 {ACM} Workshop on Digital Rights Management 2004, Washington, DC, USA, October 25, 2004}, pages = {40--53}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029146.1029147}, doi = {10.1145/1029146.1029147}, timestamp = {Mon, 15 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/RouvroySLQML04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/Safavi-Naini04, author = {Reihaneh Safavi{-}Naini}, editor = {Aggelos Kiayias and Moti Yung}, title = {Tracing traitors: a selective survey}, booktitle = {Proceedings of the 2004 {ACM} Workshop on Digital Rights Management 2004, Washington, DC, USA, October 25, 2004}, pages = {72}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029146.1029148}, doi = {10.1145/1029146.1029148}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/Safavi-Naini04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/Safavi-NainiSU04, author = {Reihaneh Safavi{-}Naini and Nicholas Paul Sheppard and Takeyuki Uehara}, editor = {Aggelos Kiayias and Moti Yung}, title = {Import/export in digital rights management}, booktitle = {Proceedings of the 2004 {ACM} Workshop on Digital Rights Management 2004, Washington, DC, USA, October 25, 2004}, pages = {99--110}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029146.1029163}, doi = {10.1145/1029146.1029163}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/Safavi-NainiSU04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/ShiLLZ04, author = {Weidong Shi and Hsien{-}Hsin S. Lee and Chenghuai Lu and Tao Zhang}, editor = {Aggelos Kiayias and Moti Yung}, title = {Attacks and risk analysis for hardware supported software copy protection systems}, booktitle = {Proceedings of the 2004 {ACM} Workshop on Digital Rights Management 2004, Washington, DC, USA, October 25, 2004}, pages = {54--62}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029146.1029156}, doi = {10.1145/1029146.1029156}, timestamp = {Thu, 14 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/ShiLLZ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/YuC04, author = {Yang Yu and Tzi{-}cker Chiueh}, editor = {Aggelos Kiayias and Moti Yung}, title = {Display-only file server: a solution against information theft due to insider attack}, booktitle = {Proceedings of the 2004 {ACM} Workshop on Digital Rights Management 2004, Washington, DC, USA, October 25, 2004}, pages = {31--39}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029146.1029154}, doi = {10.1145/1029146.1029154}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/YuC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/drm/2004, editor = {Aggelos Kiayias and Moti Yung}, title = {Proceedings of the 2004 {ACM} Workshop on Digital Rights Management 2004, Washington, DC, USA, October 25, 2004}, publisher = {{ACM}}, year = {2004}, isbn = {1-58113-969-1}, timestamp = {Wed, 15 Dec 2004 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/AdelsbachKV03, author = {Andr{\'{e}} Adelsbach and Stefan Katzenbeisser and Helmut Veith}, editor = {Moti Yung}, title = {Watermarking schemes provably secure against copy and ambiguity attacks}, booktitle = {Proceedings of the 2003 {ACM} workshop on Digital rights management 2003, Washington, DC, USA, October 27, 2003}, pages = {111--119}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/947380.947395}, doi = {10.1145/947380.947395}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/AdelsbachKV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/AttrapadungK03, author = {Nuttapong Attrapadung and Kazukuni Kobara and Hideki Imai}, editor = {Moti Yung}, title = {Broadcast encryption with short keys and transmissions}, booktitle = {Proceedings of the 2003 {ACM} workshop on Digital rights management 2003, Washington, DC, USA, October 27, 2003}, pages = {55--66}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/947380.947388}, doi = {10.1145/947380.947388}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/AttrapadungK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/ByersCKMC03, author = {Simon D. Byers and Lorrie Faith Cranor and David P. Kormann and Patrick D. McDaniel and Eric Cronin}, editor = {Moti Yung}, title = {Analysis of security vulnerabilities in the movie production and distribution process}, booktitle = {Proceedings of the 2003 {ACM} workshop on Digital rights management 2003, Washington, DC, USA, October 27, 2003}, pages = {1--12}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/947380.947383}, doi = {10.1145/947380.947383}, timestamp = {Thu, 05 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/ByersCKMC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/DodisR03, author = {Yevgeniy Dodis and Leonid Reyzin}, editor = {Moti Yung}, title = {Breaking and repairing optimistic fair exchange from {PODC} 2003}, booktitle = {Proceedings of the 2003 {ACM} workshop on Digital rights management 2003, Washington, DC, USA, October 27, 2003}, pages = {47--54}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/947380.947387}, doi = {10.1145/947380.947387}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/DodisR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/GalSP03, author = {Tsvi Gal and Howard M. Singer and Laird Popkin}, editor = {Moti Yung}, title = {The {IP} war: apocalypse or revolution?}, booktitle = {Proceedings of the 2003 {ACM} workshop on Digital rights management 2003, Washington, DC, USA, October 27, 2003}, pages = {39--46}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/947380.947381}, doi = {10.1145/947380.947381}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/GalSP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/GuthNS03, author = {Susanne Guth and Gustaf Neumann and Mark Strembeck}, editor = {Moti Yung}, title = {Experiences with the enforcement of access rights extracted from ODRL-based digital contracts}, booktitle = {Proceedings of the 2003 {ACM} workshop on Digital rights management 2003, Washington, DC, USA, October 27, 2003}, pages = {90--102}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/947380.947392}, doi = {10.1145/947380.947392}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/GuthNS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/HeilemanY03, author = {Gregory L. Heileman and Yunlong Yang}, editor = {Moti Yung}, title = {The effects of invisible watermarking on satellite image classification}, booktitle = {Proceedings of the 2003 {ACM} workshop on Digital rights management 2003, Washington, DC, USA, October 27, 2003}, pages = {120--132}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/947380.947396}, doi = {10.1145/947380.947396}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/HeilemanY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/LiSJ03, author = {Yingjiu Li and Vipin Swarup and Sushil Jajodia}, editor = {Moti Yung}, title = {Constructing a virtual primary key for fingerprinting relational data}, booktitle = {Proceedings of the 2003 {ACM} workshop on Digital rights management 2003, Washington, DC, USA, October 27, 2003}, pages = {133--141}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/947380.947398}, doi = {10.1145/947380.947398}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/LiSJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/MessergesD03, author = {Thomas S. Messerges and Ezzat A. Dabbish}, editor = {Moti Yung}, title = {Digital rights management in a 3G mobile phone and beyond}, booktitle = {Proceedings of the 2003 {ACM} workshop on Digital rights management 2003, Washington, DC, USA, October 27, 2003}, pages = {27--38}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/947380.947385}, doi = {10.1145/947380.947385}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/MessergesD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/MulliganHB03, author = {Deirdre K. Mulligan and John Han and Aaron J. Burstein}, editor = {Moti Yung}, title = {How DRM-based content delivery systems disrupt expectations of "personal use"}, booktitle = {Proceedings of the 2003 {ACM} workshop on Digital rights management 2003, Washington, DC, USA, October 27, 2003}, pages = {77--89}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/947380.947391}, doi = {10.1145/947380.947391}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/MulliganHB03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/NicolakisPPW03, author = {Howard Goldstein and Gregory L. Heileman and Mark D. Heileman and Theo Nicolakis and Carlos E. Pizano and Bianca Prumo and Mitchell Webb}, editor = {Moti Yung}, title = {Protecting digital archives at the Greek Orthodox Archdiocese of America}, booktitle = {Proceedings of the 2003 {ACM} workshop on Digital rights management 2003, Washington, DC, USA, October 27, 2003}, pages = {13--26}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/947380.947384}, doi = {10.1145/947380.947384}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/NicolakisPPW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/SosonkinNM03, author = {Mikhail Sosonkin and Gleb Naumovich and Nasir D. Memon}, editor = {Moti Yung}, title = {Obfuscation of design intent in object-oriented applications}, booktitle = {Proceedings of the 2003 {ACM} workshop on Digital rights management 2003, Washington, DC, USA, October 27, 2003}, pages = {142--153}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/947380.947399}, doi = {10.1145/947380.947399}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/SosonkinNM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/ToSZ03, author = {Vu Dong T{\^{o}} and Reihaneh Safavi{-}Naini and Fangguo Zhang}, editor = {Moti Yung}, title = {New traitor tracing schemes using bilinear map}, booktitle = {Proceedings of the 2003 {ACM} workshop on Digital rights management 2003, Washington, DC, USA, October 27, 2003}, pages = {67--76}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/947380.947389}, doi = {10.1145/947380.947389}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/ToSZ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/UzunerD03, author = {{\"{O}}zlem Uzuner and Randall Davis}, editor = {Moti Yung}, title = {Content and expression-based copy recognition for intellectual property protection}, booktitle = {Proceedings of the 2003 {ACM} workshop on Digital rights management 2003, Washington, DC, USA, October 27, 2003}, pages = {103--110}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/947380.947393}, doi = {10.1145/947380.947393}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/UzunerD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:conf/drm/Bauckhage03, author = {Tobias Bauckhage}, editor = {Eberhard Becker and Willms Buhse and Dirk G{\"{u}}nnewig and Niels Rump}, title = {The Basic Economic Theory of Copying}, booktitle = {Digital Rights Management - Technological, Economic, Legal and Political Aspects}, series = {Lecture Notes in Computer Science}, volume = {2770}, pages = {234--249}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10941270\_16}, doi = {10.1007/10941270\_16}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/drm/Bauckhage03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:conf/drm/Bechtold03, author = {Stefan Bechtold}, editor = {Eberhard Becker and Willms Buhse and Dirk G{\"{u}}nnewig and Niels Rump}, title = {The Present and Future of {DRM} - Musings on Emerging Legal Problems}, booktitle = {Digital Rights Management - Technological, Economic, Legal and Political Aspects}, series = {Lecture Notes in Computer Science}, volume = {2770}, pages = {597--654}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10941270\_36}, doi = {10.1007/10941270\_36}, timestamp = {Fri, 29 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/Bechtold03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:conf/drm/BeckerBGR03, author = {Eberhard Becker and Willms Buhse and Dirk G{\"{u}}nnewig and Niels Rump}, editor = {Eberhard Becker and Willms Buhse and Dirk G{\"{u}}nnewig and Niels Rump}, title = {{DRM} as Interlocking Challenge for Different Scientific Disciplines: Introduction}, booktitle = {Digital Rights Management - Technological, Economic, Legal and Political Aspects}, series = {Lecture Notes in Computer Science}, volume = {2770}, pages = {1--2}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10941270\_1}, doi = {10.1007/10941270\_1}, timestamp = {Fri, 29 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/BeckerBGR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:conf/drm/BeckerG03, author = {Eberhard Becker and Dirk G{\"{u}}nnewig}, editor = {Eberhard Becker and Willms Buhse and Dirk G{\"{u}}nnewig and Niels Rump}, title = {Getting Insights: {DRM} Conferences 2000 and 2002}, booktitle = {Digital Rights Management - Technological, Economic, Legal and Political Aspects}, series = {Lecture Notes in Computer Science}, volume = {2770}, pages = {655--656}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10941270\_37}, doi = {10.1007/10941270\_37}, timestamp = {Fri, 29 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/BeckerG03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:conf/drm/BeckerG03a, author = {Eberhard Becker and Dirk G{\"{u}}nnewig}, editor = {Eberhard Becker and Willms Buhse and Dirk G{\"{u}}nnewig and Niels Rump}, title = {{DRM} Workshop 2000: Summary}, booktitle = {Digital Rights Management - Technological, Economic, Legal and Political Aspects}, series = {Lecture Notes in Computer Science}, volume = {2770}, pages = {657--663}, publisher = {Springer}, year = {2003}, timestamp = {Fri, 29 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/BeckerG03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:conf/drm/BeckerG03b, author = {Eberhard Becker and Dirk G{\"{u}}nnewig}, editor = {Eberhard Becker and Willms Buhse and Dirk G{\"{u}}nnewig and Niels Rump}, title = {{DRM} Conference 2002: Summary}, booktitle = {Digital Rights Management - Technological, Economic, Legal and Political Aspects}, series = {Lecture Notes in Computer Science}, volume = {2770}, pages = {664--684}, publisher = {Springer}, year = {2003}, timestamp = {Fri, 29 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/BeckerG03b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:conf/drm/BiddleEPW03, author = {Peter Biddle and Paul England and Marcus Peinado and Bryan Willman}, editor = {Eberhard Becker and Willms Buhse and Dirk G{\"{u}}nnewig and Niels Rump}, title = {The Darknet and the Future of Content Protection}, booktitle = {Digital Rights Management - Technological, Economic, Legal and Political Aspects}, series = {Lecture Notes in Computer Science}, volume = {2770}, pages = {344--365}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10941270\_23}, doi = {10.1007/10941270\_23}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/BiddleEPW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:conf/drm/Bohm03, author = {Bettina B{\"{o}}hm}, editor = {Eberhard Becker and Willms Buhse and Dirk G{\"{u}}nnewig and Niels Rump}, title = {Implementation of the European Info Directive in German Law and Its Consequences for Teaching and Research}, booktitle = {Digital Rights Management - Technological, Economic, Legal and Political Aspects}, series = {Lecture Notes in Computer Science}, volume = {2770}, pages = {520--527}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10941270\_32}, doi = {10.1007/10941270\_32}, timestamp = {Fri, 29 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/Bohm03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:conf/drm/BremerB03, author = {Oliver Bremer and Willms Buhse}, editor = {Eberhard Becker and Willms Buhse and Dirk G{\"{u}}nnewig and Niels Rump}, title = {Standardization in {DRM} - Trends and Recommendations}, booktitle = {Digital Rights Management - Technological, Economic, Legal and Political Aspects}, series = {Lecture Notes in Computer Science}, volume = {2770}, pages = {334--343}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10941270\_22}, doi = {10.1007/10941270\_22}, timestamp = {Fri, 29 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/BremerB03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:conf/drm/BuhseW03, author = {Willms Buhse and Am{\'{e}}lie Wetzel}, editor = {Eberhard Becker and Willms Buhse and Dirk G{\"{u}}nnewig and Niels Rump}, title = {Creating a Framework for Business Models for Digital Content - Mobile Music as Case Study}, booktitle = {Digital Rights Management - Technological, Economic, Legal and Political Aspects}, series = {Lecture Notes in Computer Science}, volume = {2770}, pages = {271--287}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10941270\_18}, doi = {10.1007/10941270\_18}, timestamp = {Fri, 29 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/BuhseW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:conf/drm/Bygrave03, author = {Lee A. Bygrave}, editor = {Eberhard Becker and Willms Buhse and Dirk G{\"{u}}nnewig and Niels Rump}, title = {{DRM} and Privacy - Legal Aspects in the European Union}, booktitle = {Digital Rights Management - Technological, Economic, Legal and Political Aspects}, series = {Lecture Notes in Computer Science}, volume = {2770}, pages = {418--446}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10941270\_27}, doi = {10.1007/10941270\_27}, timestamp = {Fri, 29 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/Bygrave03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:conf/drm/ChengR03, author = {Spencer Cheng and Avni Rambhia}, editor = {Eberhard Becker and Willms Buhse and Dirk G{\"{u}}nnewig and Niels Rump}, title = {{DRM} and Standardization - Can {DRM} Be Standardized?}, booktitle = {Digital Rights Management - Technological, Economic, Legal and Political Aspects}, series = {Lecture Notes in Computer Science}, volume = {2770}, pages = {162--177}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10941270\_12}, doi = {10.1007/10941270\_12}, timestamp = {Fri, 29 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/ChengR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:conf/drm/Clement03, author = {Michel Clement}, editor = {Eberhard Becker and Willms Buhse and Dirk G{\"{u}}nnewig and Niels Rump}, title = {Lessons from Content-for-Free Distribution Channels}, booktitle = {Digital Rights Management - Technological, Economic, Legal and Political Aspects}, series = {Lecture Notes in Computer Science}, volume = {2770}, pages = {321--333}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10941270\_21}, doi = {10.1007/10941270\_21}, timestamp = {Fri, 29 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/Clement03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:conf/drm/DreierN03, author = {Thomas Dreier and Georg Nolte}, editor = {Eberhard Becker and Willms Buhse and Dirk G{\"{u}}nnewig and Niels Rump}, title = {The German Copyright - Yesterday, Today, Tomorrow}, booktitle = {Digital Rights Management - Technological, Economic, Legal and Political Aspects}, series = {Lecture Notes in Computer Science}, volume = {2770}, pages = {479--501}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10941270\_30}, doi = {10.1007/10941270\_30}, timestamp = {Fri, 29 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/DreierN03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:conf/drm/Dusollier03, author = {S{\'{e}}verine Dusollier}, editor = {Eberhard Becker and Willms Buhse and Dirk G{\"{u}}nnewig and Niels Rump}, title = {Tipping the Scale in Favor of the Right Holders: The European Anti-Circumvention Provisions}, booktitle = {Digital Rights Management - Technological, Economic, Legal and Political Aspects}, series = {Lecture Notes in Computer Science}, volume = {2770}, pages = {462--478}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10941270\_29}, doi = {10.1007/10941270\_29}, timestamp = {Fri, 29 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/Dusollier03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:conf/drm/Fetscherin03, author = {Marc Fetscherin}, editor = {Eberhard Becker and Willms Buhse and Dirk G{\"{u}}nnewig and Niels Rump}, title = {Evaluating Consumer Acceptance for Protected Digital Content}, booktitle = {Digital Rights Management - Technological, Economic, Legal and Political Aspects}, series = {Lecture Notes in Computer Science}, volume = {2770}, pages = {321--333}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10941270\_20}, doi = {10.1007/10941270\_20}, timestamp = {Fri, 29 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/Fetscherin03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:conf/drm/Goldmann03, author = {Bettina Goldmann}, editor = {Eberhard Becker and Willms Buhse and Dirk G{\"{u}}nnewig and Niels Rump}, title = {Copy Protection by {DRM} in the {EU} and Germany: Legal Aspects}, booktitle = {Digital Rights Management - Technological, Economic, Legal and Political Aspects}, series = {Lecture Notes in Computer Science}, volume = {2770}, pages = {502--519}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10941270\_31}, doi = {10.1007/10941270\_31}, timestamp = {Fri, 29 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/Goldmann03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:conf/drm/Gooch03, author = {Richard Gooch}, editor = {Eberhard Becker and Willms Buhse and Dirk G{\"{u}}nnewig and Niels Rump}, title = {Requirements for {DRM} Systems}, booktitle = {Digital Rights Management - Technological, Economic, Legal and Political Aspects}, series = {Lecture Notes in Computer Science}, volume = {2770}, pages = {16--25}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10941270\_3}, doi = {10.1007/10941270\_3}, timestamp = {Fri, 29 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/Gooch03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:conf/drm/Gunnewig03, author = {Dirk G{\"{u}}nnewig}, editor = {Eberhard Becker and Willms Buhse and Dirk G{\"{u}}nnewig and Niels Rump}, title = {New Copyright for the Digital Age: Political Conflicts in Germany}, booktitle = {Digital Rights Management - Technological, Economic, Legal and Political Aspects}, series = {Lecture Notes in Computer Science}, volume = {2770}, pages = {528--573}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10941270\_33}, doi = {10.1007/10941270\_33}, timestamp = {Fri, 29 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/Gunnewig03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:conf/drm/Guth03, author = {Susanne Guth}, editor = {Eberhard Becker and Willms Buhse and Dirk G{\"{u}}nnewig and Niels Rump}, title = {Rights Expression Languages}, booktitle = {Digital Rights Management - Technological, Economic, Legal and Political Aspects}, series = {Lecture Notes in Computer Science}, volume = {2770}, pages = {101--112}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10941270\_8}, doi = {10.1007/10941270\_8}, timestamp = {Fri, 29 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/Guth03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:conf/drm/Guth03a, author = {Susanne Guth}, editor = {Eberhard Becker and Willms Buhse and Dirk G{\"{u}}nnewig and Niels Rump}, title = {A Sample {DRM} System}, booktitle = {Digital Rights Management - Technological, Economic, Legal and Political Aspects}, series = {Lecture Notes in Computer Science}, volume = {2770}, pages = {150--161}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10941270\_11}, doi = {10.1007/10941270\_11}, timestamp = {Fri, 29 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/Guth03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:conf/drm/HaberHPST03, author = {Stuart Haber and Bill G. Horne and Joe Pato and Tomas Sander and Robert Endre Tarjan}, editor = {Eberhard Becker and Willms Buhse and Dirk G{\"{u}}nnewig and Niels Rump}, title = {If Piracy Is the Problem, Is {DRM} the Answer?}, booktitle = {Digital Rights Management - Technological, Economic, Legal and Political Aspects}, series = {Lecture Notes in Computer Science}, volume = {2770}, pages = {224--233}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10941270\_15}, doi = {10.1007/10941270\_15}, timestamp = {Fri, 29 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/HaberHPST03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:conf/drm/Hartung03, author = {Frank Hartung}, editor = {Eberhard Becker and Willms Buhse and Dirk G{\"{u}}nnewig and Niels Rump}, title = {Mobile {DRM}}, booktitle = {Digital Rights Management - Technological, Economic, Legal and Political Aspects}, series = {Lecture Notes in Computer Science}, volume = {2770}, pages = {138--149}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10941270\_10}, doi = {10.1007/10941270\_10}, timestamp = {Fri, 29 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/Hartung03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:conf/drm/HauserW03, author = {Tobias Hauser and Christian Wenz}, editor = {Eberhard Becker and Willms Buhse and Dirk G{\"{u}}nnewig and Niels Rump}, title = {{DRM} Under Attack: Weaknesses in Existing Systems}, booktitle = {Digital Rights Management - Technological, Economic, Legal and Political Aspects}, series = {Lecture Notes in Computer Science}, volume = {2770}, pages = {206--223}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10941270\_14}, doi = {10.1007/10941270\_14}, timestamp = {Fri, 29 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/HauserW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:conf/drm/Herre03, author = {J{\"{u}}rgen Herre}, editor = {Eberhard Becker and Willms Buhse and Dirk G{\"{u}}nnewig and Niels Rump}, title = {Content Based Identification (Fingerprinting)}, booktitle = {Digital Rights Management - Technological, Economic, Legal and Political Aspects}, series = {Lecture Notes in Computer Science}, volume = {2770}, pages = {93--100}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10941270\_7}, doi = {10.1007/10941270\_7}, timestamp = {Fri, 29 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/Herre03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:conf/drm/Hoeren03, author = {Thomas Hoeren}, editor = {Eberhard Becker and Willms Buhse and Dirk G{\"{u}}nnewig and Niels Rump}, title = {Copyright Dilemma: Access Right as a Postmodern Symbol of Copyright Deconstruction?}, booktitle = {Digital Rights Management - Technological, Economic, Legal and Political Aspects}, series = {Lecture Notes in Computer Science}, volume = {2770}, pages = {574--586}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10941270\_34}, doi = {10.1007/10941270\_34}, timestamp = {Fri, 29 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/Hoeren03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:conf/drm/KuhlmannG03, author = {Dirk Kuhlmann and Robert A. Gehring}, editor = {Eberhard Becker and Willms Buhse and Dirk G{\"{u}}nnewig and Niels Rump}, title = {Trusted Platforms, DRM, and Beyond}, booktitle = {Digital Rights Management - Technological, Economic, Legal and Political Aspects}, series = {Lecture Notes in Computer Science}, volume = {2770}, pages = {178--205}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10941270\_13}, doi = {10.1007/10941270\_13}, timestamp = {Fri, 29 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/KuhlmannG03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:conf/drm/Lejeune03, author = {Mathias Lejeune}, editor = {Eberhard Becker and Willms Buhse and Dirk G{\"{u}}nnewig and Niels Rump}, title = {Protection under {US} Copyright Law}, booktitle = {Digital Rights Management - Technological, Economic, Legal and Political Aspects}, series = {Lecture Notes in Computer Science}, volume = {2770}, pages = {366--382}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10941270\_24}, doi = {10.1007/10941270\_24}, timestamp = {Fri, 29 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/Lejeune03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:conf/drm/Paskin03, author = {Norman Paskin}, editor = {Eberhard Becker and Willms Buhse and Dirk G{\"{u}}nnewig and Niels Rump}, title = {Identification and Metadata}, booktitle = {Digital Rights Management - Technological, Economic, Legal and Political Aspects}, series = {Lecture Notes in Computer Science}, volume = {2770}, pages = {26--61}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10941270\_4}, doi = {10.1007/10941270\_4}, timestamp = {Fri, 29 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/Paskin03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:conf/drm/Petitcolas03, author = {Fabien A. P. Petitcolas}, editor = {Eberhard Becker and Willms Buhse and Dirk G{\"{u}}nnewig and Niels Rump}, title = {Digital Watermarking}, booktitle = {Digital Rights Management - Technological, Economic, Legal and Political Aspects}, series = {Lecture Notes in Computer Science}, volume = {2770}, pages = {81--92}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10941270\_6}, doi = {10.1007/10941270\_6}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/Petitcolas03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:conf/drm/PicotF03, author = {Arnold Picot and Marina Fiedler}, editor = {Eberhard Becker and Willms Buhse and Dirk G{\"{u}}nnewig and Niels Rump}, title = {Impacts of {DRM} on Internet Based Innovation}, booktitle = {Digital Rights Management - Technological, Economic, Legal and Political Aspects}, series = {Lecture Notes in Computer Science}, volume = {2770}, pages = {288--300}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10941270\_19}, doi = {10.1007/10941270\_19}, timestamp = {Fri, 29 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/PicotF03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:conf/drm/Reinbothe03, author = {J{\"{o}}rg Reinbothe}, editor = {Eberhard Becker and Willms Buhse and Dirk G{\"{u}}nnewig and Niels Rump}, title = {European Copyright - Yesterday, Today, Tomorrow}, booktitle = {Digital Rights Management - Technological, Economic, Legal and Political Aspects}, series = {Lecture Notes in Computer Science}, volume = {2770}, pages = {405--417}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10941270\_26}, doi = {10.1007/10941270\_26}, timestamp = {Fri, 29 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/Reinbothe03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:conf/drm/Rump03, author = {Niels Rump}, editor = {Eberhard Becker and Willms Buhse and Dirk G{\"{u}}nnewig and Niels Rump}, title = {Definition, Aspects, and Overview}, booktitle = {Digital Rights Management - Technological, Economic, Legal and Political Aspects}, series = {Lecture Notes in Computer Science}, volume = {2770}, pages = {3--15}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10941270\_2}, doi = {10.1007/10941270\_2}, timestamp = {Fri, 29 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/Rump03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:conf/drm/SadeghiS03, author = {Ahmad{-}Reza Sadeghi and Markus Schneider}, editor = {Eberhard Becker and Willms Buhse and Dirk G{\"{u}}nnewig and Niels Rump}, title = {Electronic Payment Systems}, booktitle = {Digital Rights Management - Technological, Economic, Legal and Political Aspects}, series = {Lecture Notes in Computer Science}, volume = {2770}, pages = {113--137}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10941270\_9}, doi = {10.1007/10941270\_9}, timestamp = {Fri, 29 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/SadeghiS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:conf/drm/Simons03, author = {Barbara Simons}, editor = {Eberhard Becker and Willms Buhse and Dirk G{\"{u}}nnewig and Niels Rump}, title = {The Copyright Wars - {A} Computer Scientist's View of Copyright in the U. S.}, booktitle = {Digital Rights Management - Technological, Economic, Legal and Political Aspects}, series = {Lecture Notes in Computer Science}, volume = {2770}, pages = {383--404}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10941270\_25}, doi = {10.1007/10941270\_25}, timestamp = {Fri, 29 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/Simons03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:conf/drm/Spenger03, author = {Gabriele Spenger}, editor = {Eberhard Becker and Willms Buhse and Dirk G{\"{u}}nnewig and Niels Rump}, title = {Authentication, Identification Techniques, and Secure Containers - Baseline Technologies}, booktitle = {Digital Rights Management - Technological, Economic, Legal and Political Aspects}, series = {Lecture Notes in Computer Science}, volume = {2770}, pages = {62--80}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10941270\_5}, doi = {10.1007/10941270\_5}, timestamp = {Fri, 29 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/Spenger03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:conf/drm/Ulbricht03, author = {Johannes Ulbricht}, editor = {Eberhard Becker and Willms Buhse and Dirk G{\"{u}}nnewig and Niels Rump}, title = {Business, Technology, and Law - Interrelations of Three Scientific Perspectives on {DRM}}, booktitle = {Digital Rights Management - Technological, Economic, Legal and Political Aspects}, series = {Lecture Notes in Computer Science}, volume = {2770}, pages = {587--596}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10941270\_35}, doi = {10.1007/10941270\_35}, timestamp = {Fri, 29 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/Ulbricht03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:conf/drm/Ulmer-Eilfort03, author = {Constanze Ulmer{-}Eilfort}, editor = {Eberhard Becker and Willms Buhse and Dirk G{\"{u}}nnewig and Niels Rump}, title = {Private Copying and Levies for Information- and Communication-Technologies and Storage Media in Europe}, booktitle = {Digital Rights Management - Technological, Economic, Legal and Political Aspects}, series = {Lecture Notes in Computer Science}, volume = {2770}, pages = {447--461}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10941270\_28}, doi = {10.1007/10941270\_28}, timestamp = {Fri, 29 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/Ulmer-Eilfort03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:conf/drm/Wigand03, author = {Rolf T. Wigand}, editor = {Eberhard Becker and Willms Buhse and Dirk G{\"{u}}nnewig and Niels Rump}, title = {Facing the Music: Value-Driven Electronic Markets, Networks and Value Webs in Economic Integration of Digital Products}, booktitle = {Digital Rights Management - Technological, Economic, Legal and Political Aspects}, series = {Lecture Notes in Computer Science}, volume = {2770}, pages = {250--270}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10941270\_17}, doi = {10.1007/10941270\_17}, timestamp = {Fri, 29 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/Wigand03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2002drm, editor = {Joan Feigenbaum}, title = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop, {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2696}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/b11725}, doi = {10.1007/B11725}, isbn = {3-540-40410-4}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2002drm.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:conf/drm/2003, editor = {Eberhard Becker and Willms Buhse and Dirk G{\"{u}}nnewig and Niels Rump}, title = {Digital Rights Management - Technological, Economic, Legal and Political Aspects}, series = {Lecture Notes in Computer Science}, volume = {2770}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/b12637}, doi = {10.1007/B12637}, isbn = {3-540-40465-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/drm/2003w, editor = {Moti Yung}, title = {Proceedings of the 2003 {ACM} workshop on Digital rights management 2003, Washington, DC, USA, October 27, 2003}, publisher = {{ACM}}, year = {2003}, isbn = {1-58113-786-9}, timestamp = {Thu, 23 Jun 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/2003w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BiddleEPW02, author = {Peter Biddle and Paul England and Marcus Peinado and Bryan Willman}, editor = {Joan Feigenbaum}, title = {The Darknet and the Future of Content Protection}, booktitle = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop, {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2696}, pages = {155--176}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-44993-5\_10}, doi = {10.1007/978-3-540-44993-5\_10}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BiddleEPW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BoldyrevaJ02, author = {Alexandra Boldyreva and Markus Jakobsson}, editor = {Joan Feigenbaum}, title = {Theft-Protected Proprietary Certificates}, booktitle = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop, {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2696}, pages = {208--220}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-44993-5\_13}, doi = {10.1007/978-3-540-44993-5\_13}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BoldyrevaJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChowEJO02, author = {Stanley Chow and Philip A. Eisen and Harold Johnson and Paul C. van Oorschot}, editor = {Joan Feigenbaum}, title = {A White-Box {DES} Implementation for {DRM} Applications}, booktitle = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop, {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2696}, pages = {1--15}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-44993-5\_1}, doi = {10.1007/978-3-540-44993-5\_1}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ChowEJO02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DodisF02, author = {Yevgeniy Dodis and Nelly Fazio}, editor = {Joan Feigenbaum}, title = {Public Key Broadcast Encryption for Stateless Receivers}, booktitle = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop, {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2696}, pages = {61--80}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-44993-5\_5}, doi = {10.1007/978-3-540-44993-5\_5}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/DodisF02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Halderman02, author = {John A. Halderman}, editor = {Joan Feigenbaum}, title = {Evaluating New Copy-Prevention Techniques for Audio CDs}, booktitle = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop, {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2696}, pages = {101--117}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-44993-5\_7}, doi = {10.1007/978-3-540-44993-5\_7}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Halderman02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JacobBF02, author = {Matthias Jacob and Dan Boneh and Edward W. Felten}, editor = {Joan Feigenbaum}, title = {Attacking an Obfuscated Cipher by Injecting Faults}, booktitle = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop, {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2696}, pages = {16--31}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-44993-5\_2}, doi = {10.1007/978-3-540-44993-5\_2}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/JacobBF02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JohnsonS02, author = {Robert Johnson and Jessica Staddon}, editor = {Joan Feigenbaum}, title = {{FAIR:} Fair Audience InfeRence}, booktitle = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop, {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2696}, pages = {190--207}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-44993-5\_12}, doi = {10.1007/978-3-540-44993-5\_12}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/JohnsonS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KiayiasY02, author = {Aggelos Kiayias and Moti Yung}, editor = {Joan Feigenbaum}, title = {Breaking and Repairing Asymmetric Public-Key Traitor Tracing}, booktitle = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop, {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2696}, pages = {32--50}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-44993-5\_3}, doi = {10.1007/978-3-540-44993-5\_3}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/KiayiasY02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KirovskiP02, author = {Darko Kirovski and Fabien A. P. Petitcolas}, editor = {Joan Feigenbaum}, title = {Replacement Attack on Arbitrary Watermarking Systems}, booktitle = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop, {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2696}, pages = {177--189}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-44993-5\_11}, doi = {10.1007/978-3-540-44993-5\_11}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/KirovskiP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KorbaK02, author = {Larry Korba and Steve Kenny}, editor = {Joan Feigenbaum}, title = {Towards Meeting the Privacy Challenge: Adapting {DRM}}, booktitle = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop, {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2696}, pages = {118--136}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-44993-5\_8}, doi = {10.1007/978-3-540-44993-5\_8}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/KorbaK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LaMacchia02, author = {Brian A. LaMacchia}, editor = {Joan Feigenbaum}, title = {Key Challenges in {DRM:} An Industry Perspective}, booktitle = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop, {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2696}, pages = {51--60}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-44993-5\_4}, doi = {10.1007/978-3-540-44993-5\_4}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LaMacchia02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MulliganB02, author = {Deirdre K. Mulligan and Aaron J. Burstein}, editor = {Joan Feigenbaum}, title = {Implementing Copyright Limitations in Rights Expression Languages}, booktitle = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop, {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2696}, pages = {137--154}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-44993-5\_9}, doi = {10.1007/978-3-540-44993-5\_9}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MulliganB02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Safavi-NainiW02, author = {Reihaneh Safavi{-}Naini and Yejing Wang}, editor = {Joan Feigenbaum}, title = {Traitor Tracing for Shortened and Corrupted Fingerprints}, booktitle = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop, {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2696}, pages = {81--100}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-44993-5\_6}, doi = {10.1007/978-3-540-44993-5\_6}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Safavi-NainiW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2001drm, editor = {Tomas Sander}, title = {Security and Privacy in Digital Rights Management, {ACM} {CCS-8} Workshop {DRM} 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2320}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-47870-1}, doi = {10.1007/3-540-47870-1}, isbn = {3-540-43677-4}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2001drm.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Bechtold01, author = {Stefan Bechtold}, editor = {Tomas Sander}, title = {From Copyright to Information Law - Implications of Digital Rights Management}, booktitle = {Security and Privacy in Digital Rights Management, {ACM} {CCS-8} Workshop {DRM} 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2320}, pages = {213--232}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47870-1\_14}, doi = {10.1007/3-540-47870-1\_14}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Bechtold01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Buhse01, author = {Willms Buhse}, editor = {Tomas Sander}, title = {Implications of Digital Rights Management for Online Music - {A} Business Perspective}, booktitle = {Security and Privacy in Digital Rights Management, {ACM} {CCS-8} Workshop {DRM} 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2320}, pages = {201--212}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47870-1\_13}, doi = {10.1007/3-540-47870-1\_13}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Buhse01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChangA01, author = {Hoi Chang and Mikhail J. Atallah}, editor = {Tomas Sander}, title = {Protecting Software Code by Guards}, booktitle = {Security and Privacy in Digital Rights Management, {ACM} {CCS-8} Workshop {DRM} 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2320}, pages = {160--175}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47870-1\_10}, doi = {10.1007/3-540-47870-1\_10}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ChangA01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CrosbyGJSW01, author = {Scott A. Crosby and Ian Goldberg and Robert Johnson and Dawn Xiaodong Song and David A. Wagner}, editor = {Tomas Sander}, title = {A Cryptanalysis of the High-Bandwidth Digital Content Protection System}, booktitle = {Security and Privacy in Digital Rights Management, {ACM} {CCS-8} Workshop {DRM} 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2320}, pages = {192--200}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47870-1\_12}, doi = {10.1007/3-540-47870-1\_12}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/CrosbyGJSW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FeigenbaumFSS01, author = {Joan Feigenbaum and Michael J. Freedman and Tomas Sander and Adam Shostack}, editor = {Tomas Sander}, title = {Privacy Engineering for Digital Rights Management Systems}, booktitle = {Security and Privacy in Digital Rights Management, {ACM} {CCS-8} Workshop {DRM} 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2320}, pages = {76--105}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47870-1\_6}, doi = {10.1007/3-540-47870-1\_6}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/FeigenbaumFSS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HorneMST01, author = {Bill G. Horne and Lesley R. Matheson and Casey Sheehan and Robert Endre Tarjan}, editor = {Tomas Sander}, title = {Dynamic Self-Checking Techniques for Improved Tamper Resistance}, booktitle = {Security and Privacy in Digital Rights Management, {ACM} {CCS-8} Workshop {DRM} 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2320}, pages = {141--159}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47870-1\_9}, doi = {10.1007/3-540-47870-1\_9}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/HorneMST01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JakobssonR01, author = {Markus Jakobsson and Michael K. Reiter}, editor = {Tomas Sander}, title = {Discouraging Software Piracy Using Software Aging}, booktitle = {Security and Privacy in Digital Rights Management, {ACM} {CCS-8} Workshop {DRM} 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2320}, pages = {1--12}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47870-1\_1}, doi = {10.1007/3-540-47870-1\_1}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/JakobssonR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KiayiasY01, author = {Aggelos Kiayias and Moti Yung}, editor = {Tomas Sander}, title = {On Crafty Pirates and Foxy Tracers}, booktitle = {Security and Privacy in Digital Rights Management, {ACM} {CCS-8} Workshop {DRM} 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2320}, pages = {22--39}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47870-1\_3}, doi = {10.1007/3-540-47870-1\_3}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/KiayiasY01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KingK01, author = {James King and Panos Kudumakis}, editor = {Tomas Sander}, title = {{MPEG-4} {IPMP} Extensions}, booktitle = {Security and Privacy in Digital Rights Management, {ACM} {CCS-8} Workshop {DRM} 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2320}, pages = {126--140}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47870-1\_8}, doi = {10.1007/3-540-47870-1\_8}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/KingK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KravitzYS01, author = {David W. Kravitz and Kim{-}Ee Yeoh and Nicol So}, editor = {Tomas Sander}, title = {Secure Open Systems for Protecting Privacy and Digital Services}, booktitle = {Security and Privacy in Digital Rights Management, {ACM} {CCS-8} Workshop {DRM} 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2320}, pages = {106--125}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47870-1\_7}, doi = {10.1007/3-540-47870-1\_7}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/KravitzYS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MihcakV01, author = {Mehmet Kivan{\c{c}} Mih{\c{c}}ak and Ramarathnam Venkatesan}, editor = {Tomas Sander}, title = {New Iterative Geometric Methods for Robust Perceptual Image Hashing}, booktitle = {Security and Privacy in Digital Rights Management, {ACM} {CCS-8} Workshop {DRM} 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2320}, pages = {13--21}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47870-1\_2}, doi = {10.1007/3-540-47870-1\_2}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MihcakV01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MillerF01, author = {Ernest Miller and Joan Feigenbaum}, editor = {Tomas Sander}, title = {Taking the Copy Out of Copyright}, booktitle = {Security and Privacy in Digital Rights Management, {ACM} {CCS-8} Workshop {DRM} 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2320}, pages = {233--244}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47870-1\_15}, doi = {10.1007/3-540-47870-1\_15}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MillerF01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Pinkas01, author = {Benny Pinkas}, editor = {Tomas Sander}, title = {Efficient State Updates for Key Management}, booktitle = {Security and Privacy in Digital Rights Management, {ACM} {CCS-8} Workshop {DRM} 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2320}, pages = {40--56}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47870-1\_4}, doi = {10.1007/3-540-47870-1\_4}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Pinkas01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Safavi-NainiW01, author = {Reihaneh Safavi{-}Naini and Yejing Wang}, editor = {Tomas Sander}, title = {Collusion Secure q-ary Fingerprinting for Perceptual Content}, booktitle = {Security and Privacy in Digital Rights Management, {ACM} {CCS-8} Workshop {DRM} 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2320}, pages = {57--75}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47870-1\_5}, doi = {10.1007/3-540-47870-1\_5}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Safavi-NainiW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShapiroV01, author = {William Shapiro and Radek Vingralek}, editor = {Tomas Sander}, title = {How to Manage Persistent State in {DRM} Systems}, booktitle = {Security and Privacy in Digital Rights Management, {ACM} {CCS-8} Workshop {DRM} 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2320}, pages = {176--191}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47870-1\_11}, doi = {10.1007/3-540-47870-1\_11}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ShapiroV01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.