default search action
DRMTICS 2005: Sydney, Australia
- Reihaneh Safavi-Naini, Moti Yung:
Digital Rights Management: Technologies, Issues, Challenges and Systems, First International Conference, DRMTICS 2005, Sydney, Australia, October 31 - November 2, 2005, Revised Selected Papers. Lecture Notes in Computer Science 3919, Springer 2006, ISBN 3-540-35998-2
Assurance and Authentication Issues
- Yu-Quan Zhang, Sabu Emmanuel:
A Novel Framework for Multiple Creatorship Protection of Digital Movies. 1-12 - Mahadevan Gomathisankaran, Akhilesh Tyagi:
TIVA: Trusted Integrity Verification Architecture. 13-31
Legal and Related Issues
- Brian Fitzgerald:
The Australian Sony PlayStation Case: How Far Will Anti-circumvention Law Reach in the Name of DRM? 32-51 - Supriya Singh, Margaret Jackson, Jenny Waycott, Jenine P. Beekhuyzen:
Downloading vs Purchase: Music Industry vs Consumers. 52-65 - Yee Fen Lim:
Digital Rights Management: Merging Contract, Copyright and Criminal Law. 66-74
Expressing Rights and Management
- Milan Petkovic, R. Paul Koster:
User-Attributed Rights in DRM. 75-89 - Ying Sha:
AVS-REL - A New Right Expression Language. 90-101 - Kailash Bhoopalam, Kurt Maly, Ravi Mukkamala, Mohammad Zubair, D. Agrawal, David Kaminsky:
A Comparative Study of Specification Models for Autonomic Access Control of Digital Rights. 102-112
Watermarking
- Yanjun Hu, Xiaoping Ma, Linming Dou, Ying Chen:
The Effect of Fidelity Measure Functions on the Capacity of Digital Watermarks. 113-122 - Hongmei Liu, Fenglian Shao, Jiwu Huang:
A MPEG-2 Video Watermarking Algorithm with Compensation in Bit Stream. 123-134 - Xiaoyun Wu, Xiaoping Liang, Hongmei Liu, Jiwu Huang, Guoping Qiu:
Reversible Semi-fragile Image Authentication Using Zernike Moments and Integer Wavelet Transform. 135-145
Software Issues
- Brian Blietz, Akhilesh Tyagi:
Software Tamper Resistance Through Dynamic Program Monitoring. 146-163 - Valery Pryamikov:
Call Tree Transformation for Program Obfuscation and Copy Protection. 164-179 - William Zhu, Clark D. Thomborson:
Algorithms to Watermark Software Through Register Allocation. 180-191
Fingerprinting and Image Authentication
- Seunglim Yong, Sang-Ho Lee:
An Efficient Fingerprinting Scheme with Secret Sharing. 192-202 - Takaaki Mizuki, Satoshi Nounin, Hideaki Sone, Yousuke Toyota:
Worst-Case Optimal Fingerprinting Codes for Non-threshold Collusion. 203-216 - Taehae Kim, Yongwha Chung, Seunghwan Jung, Daesung Moon:
Secure Remote Fingerprint Verification Using Dual Watermarks. 217-227
Supporting Cryptographic Technology
- Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai:
Security Weaknesses of Certain Broadcast Encryption Schemes. 228-245 - André Adelsbach, Ulrich Greveler:
A Broadcast Encryption Scheme with Free-Riders but Unconditional Security. 246-257 - Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai:
A Novel Broadcast Encryption Based on Time-Bound Cryptographic Keys. 258-276 - Jacques J. A. Fournier, Simon W. Moore:
A Vector Approach to Cryptography Implementation. 277-297
P2P Issues
- Xiaoming Wang, Bin B. Zhu, Shipeng Li:
A Novel Privacy and Copyright Protection Enforced Peer-to-Peer Network. 298-310 - Youngho Park, Jung-Hwa Shin, Kyung Hyune Rhee:
Design of a Secure Digital Contents Delivery System in P2P Networks. 311-321
Implementations and Architectures
- Jong-Weon Kim, Dong-Hwan Shin, Jong-Uk Choi:
Real-Time Implementation of Broadcast Switching System Using Audio Watermark. 322-331 - Ulrich Greveler:
Enforcing Regional DRM for Multimedia Broadcasts With and Without Trusted Computing. 332-340 - Bin B. Zhu, Yang Yang, Tierui Chen:
A DRM System Supporting What You See Is What You Pay. 341-355
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.