


default search action
Digital Rights Management Workshop 2003: Washington, DC, USA
- Moti Yung:

Proceedings of the 2003 ACM workshop on Digital rights management 2003, Washington, DC, USA, October 27, 2003. ACM 2003, ISBN 1-58113-786-9
DRM experience
- Simon D. Byers, Lorrie Faith Cranor

, David P. Kormann, Patrick D. McDaniel, Eric Cronin:
Analysis of security vulnerabilities in the movie production and distribution process. 1-12 - Howard Goldstein, Gregory L. Heileman, Mark D. Heileman, Theo Nicolakis, Carlos E. Pizano, Bianca Prumo, Mitchell Webb:

Protecting digital archives at the Greek Orthodox Archdiocese of America. 13-26 - Thomas S. Messerges, Ezzat A. Dabbish:

Digital rights management in a 3G mobile phone and beyond. 27-38 - Tsvi Gal, Howard M. Singer, Laird Popkin:

The IP war: apocalypse or revolution? 39-46
Supporting cryptographic technology
- Yevgeniy Dodis, Leonid Reyzin:

Breaking and repairing optimistic fair exchange from PODC 2003. 47-54 - Nuttapong Attrapadung, Kazukuni Kobara, Hideki Imai:

Broadcast encryption with short keys and transmissions. 55-66 - Vu Dong Tô, Reihaneh Safavi-Naini, Fangguo Zhang:

New traitor tracing schemes using bilinear map. 67-76
Copyrights and access-rights
- Deirdre K. Mulligan, John Han, Aaron J. Burstein:

How DRM-based content delivery systems disrupt expectations of "personal use". 77-89 - Susanne Guth, Gustaf Neumann, Mark Strembeck:

Experiences with the enforcement of access rights extracted from ODRL-based digital contracts. 90-102 - Özlem Uzuner, Randall Davis:

Content and expression-based copy recognition for intellectual property protection. 103-110
Watermarking
- André Adelsbach, Stefan Katzenbeisser, Helmut Veith:

Watermarking schemes provably secure against copy and ambiguity attacks. 111-119 - Gregory L. Heileman, Yunlong Yang:

The effects of invisible watermarking on satellite image classification. 120-132
Software and systems
- Yingjiu Li, Vipin Swarup, Sushil Jajodia:

Constructing a virtual primary key for fingerprinting relational data. 133-141 - Mikhail Sosonkin, Gleb Naumovich, Nasir D. Memon

:
Obfuscation of design intent in object-oriented applications. 142-153

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.



Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







last updated on 2026-05-17 00:01 CEST by the 







