The SCEAS System
Navigation Menu

Conferences in DBLP

ACM Digital Rights Management Workshop (drm)
2003 (conf/drm/2003w)

  1. Simon Byers, Lorrie Faith Cranor, David P. Kormann, Patrick Drew McDaniel, Eric Cronin
    Analysis of security vulnerabilities in the movie production and distribution process. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2003, pp:1-12 [Conf]
  2. Howard Goldstein, Gregory L. Heileman, Mark D. Heileman, Theo Nicolakis, Carlos E. Pizano, Bianca Prumo, Mitchell Webb
    Protecting digital archives at the Greek Orthodox Archdiocese of America. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2003, pp:13-26 [Conf]
  3. Thomas S. Messerges, Ezzat A. Dabbish
    Digital rights management in a 3G mobile phone and beyond. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2003, pp:27-38 [Conf]
  4. Tsvi Gal, Howard M. Singer, Laird Popkin
    The IP war: apocalypse or revolution? [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2003, pp:39-46 [Conf]
  5. Yevgeniy Dodis, Leonid Reyzin
    Breaking and repairing optimistic fair exchange from PODC 2003. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2003, pp:47-54 [Conf]
  6. Nuttapong Attrapadung, Kazukuni Kobara, Hideki Imai
    Broadcast encryption with short keys and transmissions. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2003, pp:55-66 [Conf]
  7. Vu Dong Tô, Reihaneh Safavi-Naini, Fangguo Zhang
    New traitor tracing schemes using bilinear map. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2003, pp:67-76 [Conf]
  8. Deirdre K. Mulligan, John Han, Aaron J. Burstein
    How DRM-based content delivery systems disrupt expectations of "personal use". [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2003, pp:77-89 [Conf]
  9. Susanne Guth, Gustaf Neumann, Mark Strembeck
    Experiences with the enforcement of access rights extracted from ODRL-based digital contracts. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2003, pp:90-102 [Conf]
  10. Özlem Uzuner, Randall Davis
    Content and expression-based copy recognition for intellectual property protection. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2003, pp:103-110 [Conf]
  11. André Adelsbach, Stefan Katzenbeisser, Helmut Veith
    Watermarking schemes provably secure against copy and ambiguity attacks. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2003, pp:111-119 [Conf]
  12. Gregory L. Heileman, Yunlong Yang
    The effects of invisible watermarking on satellite image classification. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2003, pp:120-132 [Conf]
  13. Yingjiu Li, Vipin Swarup, Sushil Jajodia
    Constructing a virtual primary key for fingerprinting relational data. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2003, pp:133-141 [Conf]
  14. Mikhail Sosonkin, Gleb Naumovich, Nasir D. Memon
    Obfuscation of design intent in object-oriented applications. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2003, pp:142-153 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002