Warehouse Stock Clearance Sale

Grab a bargain today!


Digital Rights Management
By

Rating

Product Description
Product Details

Promotional Information

Springer Book Archives

Table of Contents

ACM DRM 2002.- A White-Box DES Implementation for DRM Applications.- Attacking an Obfuscated Cipher by Injecting Faults.- Breaking and Repairing Asymmetric Public-Key Traitor Tracing.- Key Challenges in DRM: An Industry Perspective.- Public Key Broadcast Encryption for Stateless Receivers.- Traitor Tracing for Shortened and Corrupted Fingerprints.- Evaluating New Copy-Prevention Techniques for Audio CDs.- Towards Meeting the Privacy Challenge: Adapting DRM.- Implementing Copyright Limitations in Rights Expression Languages.- The Darknet and the Future of Content Protection.- Replacement Attack on Arbitrary Watermarking Systems.- FAIR: Fair Audience InfeRence.- Theft-Protected Proprietary Certificates.

Ask a Question About this Product More...
 
Look for similar items by category
Item ships from and is sold by Fishpond.com, Inc.

Back to top