ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
The Illegal Copy Protection Using Hidden Agent
Lecture Notes in Computer Science - EurAsia-ICT 2002: Information and Communication Technology
◽
10.1007/3-540-36087-5_96
◽
2002
◽
pp. 832-841
◽
Cited By ~ 1
Author(s):
Deok-Gyu Lee
◽
Im-Yeong Lee
◽
Jong-Keun Ahn
◽
Yong-Hae Kong
Keyword(s):
Copy Protection
Download Full-text
Related Documents
Cited By
References
Copy protection for automotive electronic control units using authenticity heartbeat signals
IEEE 10th International Conference on Industrial Informatics
◽
10.1109/indin.2012.6301060
◽
2012
◽
Cited By ~ 4
Author(s):
Armin Wasicek
Keyword(s):
Electronic Control
◽
Automotive Electronic
◽
Control Units
◽
Copy Protection
Download Full-text
Watermarking scar as an ultimate copy protection
Journal of Physics Conference Series
◽
10.1088/1742-6596/206/1/012037
◽
2010
◽
Vol 206
◽
pp. 012037
Author(s):
Sofiane Braci
◽
Abdelkader Miraoui
◽
Claude Delpha
◽
Rémy Boyer
Keyword(s):
Copy Protection
Download Full-text
Copy protection for high-definition baseband video
Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540)
◽
10.1109/itcc.2000.844202
◽
2002
◽
Author(s):
D.A. Barr
Keyword(s):
High Definition
◽
Copy Protection
Download Full-text
Improving the Host Authentication Mechanism for POD Copy Protection System
Studies in Computational Intelligence - New Directions in Intelligent Interactive Multimedia
◽
10.1007/978-3-540-68127-4_39
◽
2008
◽
pp. 373-383
Author(s):
Eun-Jun Yoon
◽
Kee-Young Yoo
Keyword(s):
Protection System
◽
Authentication Mechanism
◽
Copy Protection
Download Full-text
6. On the Political Economy of Copy Protection
A Reader in International Media Piracy
◽
10.1515/9789048527274-007
◽
2015
◽
pp. 131-144
Keyword(s):
Political Economy
◽
The Political
◽
Copy Protection
Download Full-text
A Friendly Peer-to-Peer File Sharing System with Profit but without Copy Protection
Innovative Internet Computing Systems - Lecture Notes in Computer Science
◽
10.1007/3-540-48080-3_12
◽
2002
◽
pp. 133-142
◽
Cited By ~ 5
Author(s):
Rüdiger Grimm
◽
Jürgen Nützel
Keyword(s):
File Sharing
◽
Peer To Peer
◽
File Sharing System
◽
Copy Protection
Download Full-text
Copy protection for DVD video
Proceedings of the IEEE
◽
10.1109/5.771077
◽
1999
◽
Vol 87
(7)
◽
pp. 1267-1276
◽
Cited By ~ 124
Author(s):
J.A. Bloom
◽
I.J. Cox
◽
T. Kalker
◽
J.-P.M.G. Linnartz
◽
M.L. Miller
◽
...
Keyword(s):
Copy Protection
Download Full-text
A public verifiable copy protection technique for still images
Journal of Systems and Software
◽
10.1016/s0164-1212(01)00142-x
◽
2002
◽
Vol 62
(3)
◽
pp. 195-204
◽
Cited By ~ 50
Author(s):
Wei-Bin Lee
◽
Tung-Her Chen
Keyword(s):
Still Images
◽
Public Verifiable
◽
Copy Protection
Download Full-text
Feasibility of edge-delay symbols for copy protection in optical disks
10.1117/12.399366
◽
2000
◽
Author(s):
Woon-Seong Yeo
◽
Jaesun Lee
Keyword(s):
Optical Disks
◽
Copy Protection
Download Full-text
Copy Protection by DRM in the EU and Germany: Legal Aspects
Lecture Notes in Computer Science - Digital Rights Management
◽
10.1007/10941270_31
◽
2003
◽
pp. 502-519
Author(s):
Bettina Goldmann
Keyword(s):
Legal Aspects
◽
Copy Protection
◽
The Eu
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close