|
Conferences in DBLP
Adaptive traitor tracing for large anonymous attack. [Citation Graph (, )][DBLP]
Public-key traitor tracing from efficient decoding and unbounded enrollment: extended abstract. [Citation Graph (, )][DBLP]
A four-layer model for security of digital rights management. [Citation Graph (, )][DBLP]
A formal conceptual model for rights. [Citation Graph (, )][DBLP]
Design rules for interoperable domains: controlling content dilution and content sharing. [Citation Graph (, )][DBLP]
Content identification. [Citation Graph (, )][DBLP]
Counterfeiting and anti-counterfeitingof software and content. [Citation Graph (, )][DBLP]
RSA-TBOS signcryption with proxy re-encryption. [Citation Graph (, )][DBLP]
A decision theoretic framework for analyzing binary hash-based content identification systems. [Citation Graph (, )][DBLP]
Assessing privacy criteria for drm using eu privacy legislation. [Citation Graph (, )][DBLP]
Enforcing DRM policies across applications. [Citation Graph (, )][DBLP]
|