|
Conferences in DBLP
A security architecture for pay-per-view business models in conditional access systems. [Citation Graph (, )][DBLP]
On implementing mpeg-21 intellectual property management and protection. [Citation Graph (, )][DBLP]
Drm to counter side-channel attacks? [Citation Graph (, )][DBLP]
Protecting fair use from digital rights management in china. [Citation Graph (, )][DBLP]
Digital rights management: desirable, inevitable, and almost irrelevant. [Citation Graph (, )][DBLP]
Persistent access control: a formal model for DRM. [Citation Graph (, )][DBLP]
The drm game. [Citation Graph (, )][DBLP]
Data structures for limited oblivious execution of programs while preserving locality of reference. [Citation Graph (, )][DBLP]
Slicing obfuscations: design, correctness, and evaluation. [Citation Graph (, )][DBLP]
Mechanism for software tamper resistance: an application of white-box cryptography. [Citation Graph (, )][DBLP]
Randomized radon transforms for biometric authentication via fingerprint hashing. [Citation Graph (, )][DBLP]
|