Springer Book Archives
ACM DRM 2002.- A White-Box DES Implementation for DRM Applications.- Attacking an Obfuscated Cipher by Injecting Faults.- Breaking and Repairing Asymmetric Public-Key Traitor Tracing.- Key Challenges in DRM: An Industry Perspective.- Public Key Broadcast Encryption for Stateless Receivers.- Traitor Tracing for Shortened and Corrupted Fingerprints.- Evaluating New Copy-Prevention Techniques for Audio CDs.- Towards Meeting the Privacy Challenge: Adapting DRM.- Implementing Copyright Limitations in Rights Expression Languages.- The Darknet and the Future of Content Protection.- Replacement Attack on Arbitrary Watermarking Systems.- FAIR: Fair Audience InfeRence.- Theft-Protected Proprietary Certificates.
![]() |
Ask a Question About this Product More... |
![]() |