ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Proceedings of the 8th ACM workshop on Digital rights management - DRM '08
Latest Publications
TOTAL DOCUMENTS
11
(FIVE YEARS 0)
H-INDEX
5
(FIVE YEARS 0)
Published By ACM Press
9781605582900
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Content identification
Proceedings of the 8th ACM workshop on Digital rights management - DRM '08
◽
10.1145/1456520.1456521
◽
2008
◽
Author(s):
Yacov Yacobi
Keyword(s):
Content Identification
Download Full-text
Assessing privacy criteria for drm using eu privacy legislation
Proceedings of the 8th ACM workshop on Digital rights management - DRM '08
◽
10.1145/1456520.1456534
◽
2008
◽
Cited By ~ 7
Author(s):
Anja Becker
◽
Alapan Arnab
◽
Mercè Serra
Keyword(s):
Privacy Legislation
Download Full-text
A decision theoretic framework for analyzing binary hash-based content identification systems
Proceedings of the 8th ACM workshop on Digital rights management - DRM '08
◽
10.1145/1456520.1456532
◽
2008
◽
Cited By ~ 17
Author(s):
Avinash L. Varna
◽
Ashwin Swaminathan
◽
Min Wu
Keyword(s):
Content Identification
Download Full-text
Enforcing DRM policies across applications
Proceedings of the 8th ACM workshop on Digital rights management - DRM '08
◽
10.1145/1456520.1456535
◽
2008
◽
Cited By ~ 5
Author(s):
Srijith K. Nair
◽
Andrew S. Tanenbaum
◽
Gabriela Gheorghe
◽
Bruno Crispo
Download Full-text
RSA-TBOS signcryption with proxy re-encryption
Proceedings of the 8th ACM workshop on Digital rights management - DRM '08
◽
10.1145/1456520.1456531
◽
2008
◽
Cited By ~ 9
Author(s):
Varad Kirtane
◽
C. Pandu Rangan
Download Full-text
Adaptive traitor tracing for large anonymous attack
Proceedings of the 8th ACM workshop on Digital rights management - DRM '08
◽
10.1145/1456520.1456524
◽
2008
◽
Cited By ~ 2
Author(s):
Hongxia Jin
◽
Jeffery Lotspiech
◽
Michael Nelson
◽
Nimrod Megiddo
Keyword(s):
Traitor Tracing
Download Full-text
A formal conceptual model for rights
Proceedings of the 8th ACM workshop on Digital rights management - DRM '08
◽
10.1145/1456520.1456528
◽
2008
◽
Cited By ~ 11
Author(s):
Pramod Arvind Jamkhedkar
◽
Gregory L. Heileman
Keyword(s):
Conceptual Model
Download Full-text
A four-layer model for security of digital rights management
Proceedings of the 8th ACM workshop on Digital rights management - DRM '08
◽
10.1145/1456520.1456527
◽
2008
◽
Cited By ~ 8
Author(s):
Eric Diehl
Keyword(s):
Digital Rights Management
◽
Layer Model
◽
Digital Rights
◽
Rights Management
Download Full-text
Counterfeiting and anti-counterfeitingof software and content
Proceedings of the 8th ACM workshop on Digital rights management - DRM '08
◽
10.1145/1456520.1456522
◽
2008
◽
Author(s):
Yacov Yacobi
◽
Gideon Yaniv
Download Full-text
Public-key traitor tracing from efficient decoding and unbounded enrollment
Proceedings of the 8th ACM workshop on Digital rights management - DRM '08
◽
10.1145/1456520.1456525
◽
2008
◽
Author(s):
Aggelos Kiayias
◽
Moti Yung
Keyword(s):
Public Key
◽
Traitor Tracing
◽
Efficient Decoding
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close