The SCEAS System
Navigation Menu

Conferences in DBLP

Conference on Computer and Communications Security (CCS) (ccs)
2002 (conf/ccs/2002drm)

  1. Stanley Chow, Philip A. Eisen, Harold Johnson, Paul C. van Oorschot
    A White-Box DES Implementation for DRM Applications. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2002, pp:1-15 [Conf]
  2. Matthias Jacob, Dan Boneh, Edward W. Felten
    Attacking an Obfuscated Cipher by Injecting Faults. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2002, pp:16-31 [Conf]
  3. Aggelos Kiayias, Moti Yung
    Breaking and Repairing Asymmetric Public-Key Traitor Tracing. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2002, pp:32-50 [Conf]
  4. Brian A. LaMacchia
    Key Challenges in DRM: An Industry Perspective. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2002, pp:51-60 [Conf]
  5. Yevgeniy Dodis, Nelly Fazio
    Public Key Broadcast Encryption for Stateless Receivers. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2002, pp:61-80 [Conf]
  6. Reihaneh Safavi-Naini, Yejing Wang
    Traitor Tracing for Shortened and Corrupted Fingerprints. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2002, pp:81-100 [Conf]
  7. John A. Halderman
    Evaluating New Copy-Prevention Techniques for Audio CDs. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2002, pp:101-117 [Conf]
  8. Larry Korba, Steve Kenny
    Towards Meeting the Privacy Challenge: Adapting DRM. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2002, pp:118-136 [Conf]
  9. Deirdre K. Mulligan, Aaron J. Burstein
    Implementing Copyright Limitations in Rights Expression Languages. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2002, pp:137-154 [Conf]
  10. Peter Biddle, Paul England, Marcus Peinado, Bryan Willman
    The Darknet and the Future of Content Protection. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2002, pp:155-176 [Conf]
  11. Darko Kirovski, Fabien A. P. Petitcolas
    Replacement Attack on Arbitrary Watermarking Systems. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2002, pp:177-189 [Conf]
  12. Robert Johnson, Jessica Staddon
    FAIR: Fair Audience InfeRence. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2002, pp:190-207 [Conf]
  13. Alexandra Boldyreva, Markus Jakobsson
    Theft-Protected Proprietary Certificates. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2002, pp:208-220 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002