Conferences in DBLP
(drmtics) 2005 (conf/drmtics/2005)
Yu-Quan Zhang , Sabu Emmanuel A Novel Framework for Multiple Creatorship Protection of Digital Movies. [Citation Graph (0, 0)][DBLP ] DRMTICS, 2005, pp:1-12 [Conf ] Mahadevan Gomathisankaran , Akhilesh Tyagi TIVA: Trusted Integrity Verification Architecture. [Citation Graph (0, 0)][DBLP ] DRMTICS, 2005, pp:13-31 [Conf ] Brian Fitzgerald The Australian Sony PlayStation Case: How Far Will Anti-circumvention Law Reach in the Name of DRM? [Citation Graph (0, 0)][DBLP ] DRMTICS, 2005, pp:32-51 [Conf ] Supriya Singh , Margaret Jackson , Jenny Waycott , Jenine P. Beekhuyzen Downloading vs Purchase: Music Industry vs Consumers. [Citation Graph (0, 0)][DBLP ] DRMTICS, 2005, pp:52-65 [Conf ] Yee Fen Lim Digital Rights Management: Merging Contract, Copyright and Criminal Law. [Citation Graph (0, 0)][DBLP ] DRMTICS, 2005, pp:66-74 [Conf ] Milan Petkovic , R. Paul Koster User-Attributed Rights in DRM. [Citation Graph (0, 0)][DBLP ] DRMTICS, 2005, pp:75-89 [Conf ] Ying Sha AVS-REL - A New Right Expression Language. [Citation Graph (0, 0)][DBLP ] DRMTICS, 2005, pp:90-101 [Conf ] Kailash Bhoopalam , Kurt Maly , Ravi Mukkamala , Mohammad Zubair , D. Agrawal , D. Kaminsky A Comparative Study of Specification Models for Autonomic Access Control of Digital Rights. [Citation Graph (0, 0)][DBLP ] DRMTICS, 2005, pp:102-112 [Conf ] Yanjun Hu , Xiaoping Ma , Linming Dou , Ying Chen The Effect of Fidelity Measure Functions on the Capacity of Digital Watermarks. [Citation Graph (0, 0)][DBLP ] DRMTICS, 2005, pp:113-122 [Conf ] Hongmei Liu , Fenglian Shao , Jiwu Huang A MPEG-2 Video Watermarking Algorithm with Compensation in Bit Stream. [Citation Graph (0, 0)][DBLP ] DRMTICS, 2005, pp:123-134 [Conf ] Xiaoyun Wu , Xiaoping Liang , Hongmei Liu , Jiwu Huang , Guoping Qiu Reversible Semi-fragile Image Authentication Using Zernike Moments and Integer Wavelet Transform. [Citation Graph (0, 0)][DBLP ] DRMTICS, 2005, pp:135-145 [Conf ] Brian Blietz , Akhilesh Tyagi Software Tamper Resistance Through Dynamic Program Monitoring. [Citation Graph (0, 0)][DBLP ] DRMTICS, 2005, pp:146-163 [Conf ] Valery Pryamikov Call Tree Transformation for Program Obfuscation and Copy Protection. [Citation Graph (0, 0)][DBLP ] DRMTICS, 2005, pp:164-179 [Conf ] William Zhu , Clark D. Thomborson Algorithms to Watermark Software Through Register Allocation. [Citation Graph (0, 0)][DBLP ] DRMTICS, 2005, pp:180-191 [Conf ] Seunglim Yong , Sang-Ho Lee An Efficient Fingerprinting Scheme with Secret Sharing. [Citation Graph (0, 0)][DBLP ] DRMTICS, 2005, pp:192-202 [Conf ] Takaaki Mizuki , Satoshi Nounin , Hideaki Sone , Yousuke Toyota Worst-Case Optimal Fingerprinting Codes for Non-threshold Collusion. [Citation Graph (0, 0)][DBLP ] DRMTICS, 2005, pp:203-216 [Conf ] Taehae Kim , Yongwha Chung , Seunghwan Jung , Daesung Moon Secure Remote Fingerprint Verification Using Dual Watermarks. [Citation Graph (0, 0)][DBLP ] DRMTICS, 2005, pp:217-227 [Conf ] Miodrag J. Mihaljevic , Marc P. C. Fossorier , Hideki Imai Security Weaknesses of Certain Broadcast Encryption Schemes. [Citation Graph (0, 0)][DBLP ] DRMTICS, 2005, pp:228-245 [Conf ] André Adelsbach , Ulrich Greveler A Broadcast Encryption Scheme with Free-Riders but Unconditional Security. [Citation Graph (0, 0)][DBLP ] DRMTICS, 2005, pp:246-257 [Conf ] Miodrag J. Mihaljevic , Marc P. C. Fossorier , Hideki Imai A Novel Broadcast Encryption Based on Time-Bound Cryptographic Keys. [Citation Graph (0, 0)][DBLP ] DRMTICS, 2005, pp:258-276 [Conf ] Jacques J. A. Fournier , Simon W. Moore A Vector Approach to Cryptography Implementation. [Citation Graph (0, 0)][DBLP ] DRMTICS, 2005, pp:277-297 [Conf ] Xiaoming Wang , Bin Zhu , Shipeng Li A Novel Privacy and Copyright Protection Enforced Peer-to-Peer Network. [Citation Graph (0, 0)][DBLP ] DRMTICS, 2005, pp:298-310 [Conf ] Youngho Park , Jung-Hwa Shin , Kyung Hyune Rhee Design of a Secure Digital Contents Delivery System in P2P Networks. [Citation Graph (0, 0)][DBLP ] DRMTICS, 2005, pp:311-321 [Conf ] Jong-Weon Kim , Dong-Hwan Shin , Jong-Uk Choi Real-Time Implementation of Broadcast Switching System Using Audio Watermark. [Citation Graph (0, 0)][DBLP ] DRMTICS, 2005, pp:322-331 [Conf ] Ulrich Greveler Enforcing Regional DRM for Multimedia Broadcasts With and Without Trusted Computing. [Citation Graph (0, 0)][DBLP ] DRMTICS, 2005, pp:332-340 [Conf ] Bin B. Zhu , Yang Yang , Tierui Chen A DRM System Supporting What You See Is What You Pay. [Citation Graph (0, 0)][DBLP ] DRMTICS, 2005, pp:341-355 [Conf ]