


default search action
Digital Rights Management Workshop 2008: Alexandria, VA, USA
- Gregory L. Heileman, Marc Joye:

Proceedings of the 8th ACM Workshop on Digital Rights Management, Alexandria, VA, USA, October 27, 2008. ACM 2008, ISBN 978-1-60558-290-0
Traitor tracing
- Hongxia Jin, Jeffrey B. Lotspiech, Michael J. Nelson, Nimrod Megiddo:

Adaptive traitor tracing for large anonymous attack. 1-8 - Aggelos Kiayias, Moti Yung:

Public-key traitor tracing from efficient decoding and unbounded enrollment: extended abstract. 9-18
Models for rights and interoperability
- Eric Diehl:

A four-layer model for security of digital rights management. 19-28 - Pramod A. Jamkhedkar, Gregory L. Heileman:

A formal conceptual model for rights. 29-38 - Gwenaël J. Doërr

, Ton Kalker:
Design rules for interoperable domains: controlling content dilution and content sharing. 39-50 - Yacov Yacobi:

Content identification. 51-52 - Yacov Yacobi, Gideon Yaniv:

Counterfeiting and anti-counterfeitingof software and content. 53-58
Applications
- Varad Kirtane, C. Pandu Rangan:

RSA-TBOS signcryption with proxy re-encryption. 59-66 - Avinash L. Varna, Ashwin Swaminathan, Min Wu:

A decision theoretic framework for analyzing binary hash-based content identification systems. 67-76
Implementation and legislation
- Anja Becker, Alapan Arnab, Mercè Serra:

Assessing privacy criteria for drm using eu privacy legislation. 77-86 - Srijith Krishnan Nair, Andrew S. Tanenbaum

, Gabriela Gheorghe, Bruno Crispo:
Enforcing DRM policies across applications. 87-94

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














