The SCEAS System
Navigation Menu

Conferences in DBLP

ACM Digital Rights Management Workshop (drm)
2009 (conf/drm/2009)


  1. On the security of a public-key traitor tracing scheme with sublinear ciphertext size. [Citation Graph (, )][DBLP]


  2. A simple construction for public-key encryption with revocable anonymity: the honest-sender case. [Citation Graph (, )][DBLP]


  3. On the operational semantics of rights expression languages. [Citation Graph (, )][DBLP]


  4. An implementation experience of domain management in marlin. [Citation Graph (, )][DBLP]


  5. Broadcast encryption versus public key cryptography in content protection systems. [Citation Graph (, )][DBLP]


  6. Obfuscating straight line arithmetic programs. [Citation Graph (, )][DBLP]


  7. A semi-dynamic multiple watermarking schemefor java applications. [Citation Graph (, )][DBLP]


  8. Efficient license validation in MPML DRM architecture. [Citation Graph (, )][DBLP]


  9. Videosurveillance and privacy: covering the two sides of the mirror with DRM. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002