- 2008
- Anja Becker, Alapan Arnab, Mercè Serra:
Assessing privacy criteria for drm using eu privacy legislation. Digital Rights Management Workshop 2008: 77-86 - Eric Diehl:
A four-layer model for security of digital rights management. Digital Rights Management Workshop 2008: 19-28 - Gwenaël J. Doërr, Ton Kalker:
Design rules for interoperable domains: controlling content dilution and content sharing. Digital Rights Management Workshop 2008: 39-50 - Pramod A. Jamkhedkar, Gregory L. Heileman:
A formal conceptual model for rights. Digital Rights Management Workshop 2008: 29-38 - Hongxia Jin, Jeffrey B. Lotspiech, Michael J. Nelson, Nimrod Megiddo:
Adaptive traitor tracing for large anonymous attack. Digital Rights Management Workshop 2008: 1-8 - Aggelos Kiayias, Moti Yung:
Public-key traitor tracing from efficient decoding and unbounded enrollment: extended abstract. Digital Rights Management Workshop 2008: 9-18 - Varad Kirtane, C. Pandu Rangan:
RSA-TBOS signcryption with proxy re-encryption. Digital Rights Management Workshop 2008: 59-66 - Srijith Krishnan Nair, Andrew S. Tanenbaum, Gabriela Gheorghe, Bruno Crispo:
Enforcing DRM policies across applications. Digital Rights Management Workshop 2008: 87-94 - Avinash L. Varna, Ashwin Swaminathan, Min Wu:
A decision theoretic framework for analyzing binary hash-based content identification systems. Digital Rights Management Workshop 2008: 67-76 - Yacov Yacobi:
Content identification. Digital Rights Management Workshop 2008: 51-52 - Yacov Yacobi, Gideon Yaniv:
Counterfeiting and anti-counterfeitingof software and content. Digital Rights Management Workshop 2008: 53-58 - Gregory L. Heileman, Marc Joye:
Proceedings of the 8th ACM Workshop on Digital Rights Management, Alexandria, VA, USA, October 27, 2008. ACM 2008, ISBN 978-1-60558-290-0 [contents] - 2007
- Alapan Arnab, Andrew Hutchison:
Persistent access control: a formal model for DRM. Digital Rights Management Workshop 2007: 41-53 - Ryad Benadjila, Olivier Billet, Stanislas Francfort:
Drm to counter side-channel attacks? Digital Rights Management Workshop 2007: 23-32 - Gregory L. Heileman, Pramod A. Jamkhedkar, Joud S. Khoury, Curtis J. Hrncir:
The drm game. Digital Rights Management Workshop 2007: 54-62 - Mariusz H. Jakubowski, Ramarathnam Venkatesan:
Randomized radon transforms for biometric authentication via fingerprint hashing. Digital Rights Management Workshop 2007: 90-94 - Bart Kirkels, Martijn Maas, Peter Roelse:
A security architecture for pay-per-view business models in conditional access systems. Digital Rights Management Workshop 2007: 1-9 - Anirban Majumdar, Stephen Drape, Clark D. Thomborson:
Slicing obfuscations: design, correctness, and evaluation. Digital Rights Management Workshop 2007: 70-81 - Wil Michiels, Paul Gorissen:
Mechanism for software tamper resistance: an application of white-box cryptography. Digital Rights Management Workshop 2007: 82-89 - Andrew M. Odlyzko:
Digital rights management: desirable, inevitable, and almost irrelevant. Digital Rights Management Workshop 2007: 39-40 - Nicholas Paul Sheppard:
On implementing mpeg-21 intellectual property management and protection. Digital Rights Management Workshop 2007: 10-22 - Avinash V. Varadarajan, Ramarathnam Venkatesan, C. Pandu Rangan:
Data structures for limited oblivious execution of programs while preserving locality of reference. Digital Rights Management Workshop 2007: 63-69 - Huijia Xie:
Protecting fair use from digital rights management in china. Digital Rights Management Workshop 2007: 33-38 - Moti Yung, Aggelos Kiayias, Ahmad-Reza Sadeghi:
Proceedings of the Seventh ACM Workshop on Digital Rights Management, Alexandria, VA, USA, October 29, 2007. ACM 2007, ISBN 978-1-59593-884-8 [contents] - 2006
- Bertrand Anckaert, Mariusz H. Jakubowski, Ramarathnam Venkatesan:
Proteus: virtualization for diversified tamper-resistance. Digital Rights Management Workshop 2006: 47-58 - Alapan Arnab, Andrew Hutchison:
Verifiable digital object identity system. Digital Rights Management Workshop 2006: 19-26 - Kevin Borders, Xin Zhao, Atul Prakash:
Securing sensitive content in a view-only file system. Digital Rights Management Workshop 2006: 27-36 - Daniel J. T. Chong, Robert H. Deng:
Privacy-enhanced superdistribution of layered content with trusted access control. Digital Rights Management Workshop 2006: 37-44 - Andrew Cooper, Andrew P. Martin:
Towards an open, trusted digital rights management platform. Digital Rights Management Workshop 2006: 79-88 - Lino Coria-Mendoza, Panos Nasiopoulos, Rabab Kreidieh Ward:
A robust content-dependent algorithm for video watermarking. Digital Rights Management Workshop 2006: 97-101