


default search action
DRMTICS 2005: Sydney, Australia
- Reihaneh Safavi-Naini, Moti Yung:

Digital Rights Management: Technologies, Issues, Challenges and Systems, First International Conference, DRMTICS 2005, Sydney, Australia, October 31 - November 2, 2005, Revised Selected Papers. Lecture Notes in Computer Science 3919, Springer 2006, ISBN 3-540-35998-2
Assurance and Authentication Issues
- Yu-Quan Zhang, Sabu Emmanuel:

A Novel Framework for Multiple Creatorship Protection of Digital Movies. 1-12 - Mahadevan Gomathisankaran, Akhilesh Tyagi:

TIVA: Trusted Integrity Verification Architecture. 13-31
Legal and Related Issues
- Brian Fitzgerald:

The Australian Sony PlayStation Case: How Far Will Anti-circumvention Law Reach in the Name of DRM? 32-51 - Supriya Singh

, Margaret Jackson, Jenny Waycott
, Jenine P. Beekhuyzen:
Downloading vs Purchase: Music Industry vs Consumers. 52-65 - Yee Fen Lim:

Digital Rights Management: Merging Contract, Copyright and Criminal Law. 66-74
Expressing Rights and Management
- Milan Petkovic, R. Paul Koster:

User-Attributed Rights in DRM. 75-89 - Ying Sha:

AVS-REL - A New Right Expression Language. 90-101 - Kailash Bhoopalam, Kurt Maly, Ravi Mukkamala, Mohammad Zubair, D. Agrawal, David Kaminsky:

A Comparative Study of Specification Models for Autonomic Access Control of Digital Rights. 102-112
Watermarking
- Yanjun Hu, Xiaoping Ma, Linming Dou, Ying Chen:

The Effect of Fidelity Measure Functions on the Capacity of Digital Watermarks. 113-122 - Hongmei Liu, Fenglian Shao, Jiwu Huang:

A MPEG-2 Video Watermarking Algorithm with Compensation in Bit Stream. 123-134 - Xiaoyun Wu, Xiaoping Liang, Hongmei Liu, Jiwu Huang, Guoping Qiu

:
Reversible Semi-fragile Image Authentication Using Zernike Moments and Integer Wavelet Transform. 135-145
Software Issues
- Brian Blietz, Akhilesh Tyagi:

Software Tamper Resistance Through Dynamic Program Monitoring. 146-163 - Valery Pryamikov:

Call Tree Transformation for Program Obfuscation and Copy Protection. 164-179 - William Zhu, Clark D. Thomborson:

Algorithms to Watermark Software Through Register Allocation. 180-191
Fingerprinting and Image Authentication
- Seunglim Yong, Sang-Ho Lee:

An Efficient Fingerprinting Scheme with Secret Sharing. 192-202 - Takaaki Mizuki

, Satoshi Nounin, Hideaki Sone, Yousuke Toyota:
Worst-Case Optimal Fingerprinting Codes for Non-threshold Collusion. 203-216 - Taehae Kim, Yongwha Chung, Seunghwan Jung, Daesung Moon:

Secure Remote Fingerprint Verification Using Dual Watermarks. 217-227
Supporting Cryptographic Technology
- Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai:

Security Weaknesses of Certain Broadcast Encryption Schemes. 228-245 - André Adelsbach, Ulrich Greveler:

A Broadcast Encryption Scheme with Free-Riders but Unconditional Security. 246-257 - Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai:

A Novel Broadcast Encryption Based on Time-Bound Cryptographic Keys. 258-276 - Jacques J. A. Fournier, Simon W. Moore:

A Vector Approach to Cryptography Implementation. 277-297
P2P Issues
- Xiaoming Wang, Bin B. Zhu, Shipeng Li:

A Novel Privacy and Copyright Protection Enforced Peer-to-Peer Network. 298-310 - Youngho Park, Jung-Hwa Shin, Kyung Hyune Rhee:

Design of a Secure Digital Contents Delivery System in P2P Networks. 311-321
Implementations and Architectures
- Jong-Weon Kim, Dong-Hwan Shin, Jong-Uk Choi:

Real-Time Implementation of Broadcast Switching System Using Audio Watermark. 322-331 - Ulrich Greveler:

Enforcing Regional DRM for Multimedia Broadcasts With and Without Trusted Computing. 332-340 - Bin B. Zhu, Yang Yang, Tierui Chen:

A DRM System Supporting What You See Is What You Pay. 341-355

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














