


default search action
Digital Rights Management Workshop 2002: Washington, DC, USA
- Joan Feigenbaum:

Security and Privacy in Digital Rights Management, ACM CCS-9 Workshop, DRM 2002, Washington, DC, USA, November 18, 2002, Revised Papers. Lecture Notes in Computer Science 2696, Springer 2003, ISBN 3-540-40410-4 - Stanley Chow, Philip A. Eisen, Harold Johnson, Paul C. van Oorschot:

A White-Box DES Implementation for DRM Applications. 1-15 - Matthias Jacob, Dan Boneh, Edward W. Felten:

Attacking an Obfuscated Cipher by Injecting Faults. 16-31 - Aggelos Kiayias, Moti Yung:

Breaking and Repairing Asymmetric Public-Key Traitor Tracing. 32-50 - Brian A. LaMacchia:

Key Challenges in DRM: An Industry Perspective. 51-60 - Yevgeniy Dodis, Nelly Fazio:

Public Key Broadcast Encryption for Stateless Receivers. 61-80 - Reihaneh Safavi-Naini, Yejing Wang:

Traitor Tracing for Shortened and Corrupted Fingerprints. 81-100 - John A. Halderman:

Evaluating New Copy-Prevention Techniques for Audio CDs. 101-117 - Larry Korba, Steve Kenny:

Towards Meeting the Privacy Challenge: Adapting DRM. 118-136 - Deirdre K. Mulligan, Aaron J. Burstein:

Implementing Copyright Limitations in Rights Expression Languages. 137-154 - Peter Biddle, Paul England, Marcus Peinado, Bryan Willman:

The Darknet and the Future of Content Protection. 155-176 - Darko Kirovski, Fabien A. P. Petitcolas

:
Replacement Attack on Arbitrary Watermarking Systems. 177-189 - Robert Johnson, Jessica Staddon:

FAIR: Fair Audience InfeRence. 190-207 - Alexandra Boldyreva, Markus Jakobsson:

Theft-Protected Proprietary Certificates. 208-220

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














