The SCEAS System
Navigation Menu

Conferences in DBLP

ACM Digital Rights Management Workshop (drm)
2006 (conf/drm/2006)


  1. Consumers, fans, and control: what the games industry can teach Hollywood about DRM. [Citation Graph (, )][DBLP]


  2. Vicarious infringement creates a privacy ceiling. [Citation Graph (, )][DBLP]


  3. Verifiable digital object identity system. [Citation Graph (, )][DBLP]


  4. Securing sensitive content in a view-only file system. [Citation Graph (, )][DBLP]


  5. Privacy-enhanced superdistribution of layered content with trusted access control. [Citation Graph (, )][DBLP]


  6. On interoperability of DRM. [Citation Graph (, )][DBLP]


  7. Proteus: virtualization for diversified tamper-resistance. [Citation Graph (, )][DBLP]


  8. The problem with rights expression languages. [Citation Graph (, )][DBLP]


  9. Towards a secure and interoperable DRM architecture. [Citation Graph (, )][DBLP]


  10. Towards an open, trusted digital rights management platform. [Citation Graph (, )][DBLP]


  11. Graceful infringement reactions in DRM systems. [Citation Graph (, )][DBLP]


  12. A robust content-dependent algorithm for video watermarking. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002