Conferences in DBLP
Simon Byers , Lorrie Faith Cranor , David P. Kormann , Patrick Drew McDaniel , Eric Cronin Analysis of security vulnerabilities in the movie production and distribution process. [Citation Graph (0, 0)][DBLP ] Digital Rights Management Workshop, 2003, pp:1-12 [Conf ] Howard Goldstein , Gregory L. Heileman , Mark D. Heileman , Theo Nicolakis , Carlos E. Pizano , Bianca Prumo , Mitchell Webb Protecting digital archives at the Greek Orthodox Archdiocese of America. [Citation Graph (0, 0)][DBLP ] Digital Rights Management Workshop, 2003, pp:13-26 [Conf ] Thomas S. Messerges , Ezzat A. Dabbish Digital rights management in a 3G mobile phone and beyond. [Citation Graph (0, 0)][DBLP ] Digital Rights Management Workshop, 2003, pp:27-38 [Conf ] Tsvi Gal , Howard M. Singer , Laird Popkin The IP war: apocalypse or revolution? [Citation Graph (0, 0)][DBLP ] Digital Rights Management Workshop, 2003, pp:39-46 [Conf ] Yevgeniy Dodis , Leonid Reyzin Breaking and repairing optimistic fair exchange from PODC 2003. [Citation Graph (0, 0)][DBLP ] Digital Rights Management Workshop, 2003, pp:47-54 [Conf ] Nuttapong Attrapadung , Kazukuni Kobara , Hideki Imai Broadcast encryption with short keys and transmissions. [Citation Graph (0, 0)][DBLP ] Digital Rights Management Workshop, 2003, pp:55-66 [Conf ] Vu Dong Tô , Reihaneh Safavi-Naini , Fangguo Zhang New traitor tracing schemes using bilinear map. [Citation Graph (0, 0)][DBLP ] Digital Rights Management Workshop, 2003, pp:67-76 [Conf ] Deirdre K. Mulligan , John Han , Aaron J. Burstein How DRM-based content delivery systems disrupt expectations of "personal use". [Citation Graph (0, 0)][DBLP ] Digital Rights Management Workshop, 2003, pp:77-89 [Conf ] Susanne Guth , Gustaf Neumann , Mark Strembeck Experiences with the enforcement of access rights extracted from ODRL-based digital contracts. [Citation Graph (0, 0)][DBLP ] Digital Rights Management Workshop, 2003, pp:90-102 [Conf ] Özlem Uzuner , Randall Davis Content and expression-based copy recognition for intellectual property protection. [Citation Graph (0, 0)][DBLP ] Digital Rights Management Workshop, 2003, pp:103-110 [Conf ] André Adelsbach , Stefan Katzenbeisser , Helmut Veith Watermarking schemes provably secure against copy and ambiguity attacks. [Citation Graph (0, 0)][DBLP ] Digital Rights Management Workshop, 2003, pp:111-119 [Conf ] Gregory L. Heileman , Yunlong Yang The effects of invisible watermarking on satellite image classification. [Citation Graph (0, 0)][DBLP ] Digital Rights Management Workshop, 2003, pp:120-132 [Conf ] Yingjiu Li , Vipin Swarup , Sushil Jajodia Constructing a virtual primary key for fingerprinting relational data. [Citation Graph (0, 0)][DBLP ] Digital Rights Management Workshop, 2003, pp:133-141 [Conf ] Mikhail Sosonkin , Gleb Naumovich , Nasir D. Memon Obfuscation of design intent in object-oriented applications. [Citation Graph (0, 0)][DBLP ] Digital Rights Management Workshop, 2003, pp:142-153 [Conf ]