|
Conferences in DBLP
On the security of a public-key traitor tracing scheme with sublinear ciphertext size. [Citation Graph (, )][DBLP]
A simple construction for public-key encryption with revocable anonymity: the honest-sender case. [Citation Graph (, )][DBLP]
On the operational semantics of rights expression languages. [Citation Graph (, )][DBLP]
An implementation experience of domain management in marlin. [Citation Graph (, )][DBLP]
Broadcast encryption versus public key cryptography in content protection systems. [Citation Graph (, )][DBLP]
Obfuscating straight line arithmetic programs. [Citation Graph (, )][DBLP]
A semi-dynamic multiple watermarking schemefor java applications. [Citation Graph (, )][DBLP]
Efficient license validation in MPML DRM architecture. [Citation Graph (, )][DBLP]
Videosurveillance and privacy: covering the two sides of the mirror with DRM. [Citation Graph (, )][DBLP]
|