The SCEAS System
Navigation Menu

Conferences in DBLP

(drmtics)
2005 (conf/drmtics/2005)

  1. Yu-Quan Zhang, Sabu Emmanuel
    A Novel Framework for Multiple Creatorship Protection of Digital Movies. [Citation Graph (0, 0)][DBLP]
    DRMTICS, 2005, pp:1-12 [Conf]
  2. Mahadevan Gomathisankaran, Akhilesh Tyagi
    TIVA: Trusted Integrity Verification Architecture. [Citation Graph (0, 0)][DBLP]
    DRMTICS, 2005, pp:13-31 [Conf]
  3. Brian Fitzgerald
    The Australian Sony PlayStation Case: How Far Will Anti-circumvention Law Reach in the Name of DRM? [Citation Graph (0, 0)][DBLP]
    DRMTICS, 2005, pp:32-51 [Conf]
  4. Supriya Singh, Margaret Jackson, Jenny Waycott, Jenine P. Beekhuyzen
    Downloading vs Purchase: Music Industry vs Consumers. [Citation Graph (0, 0)][DBLP]
    DRMTICS, 2005, pp:52-65 [Conf]
  5. Yee Fen Lim
    Digital Rights Management: Merging Contract, Copyright and Criminal Law. [Citation Graph (0, 0)][DBLP]
    DRMTICS, 2005, pp:66-74 [Conf]
  6. Milan Petkovic, R. Paul Koster
    User-Attributed Rights in DRM. [Citation Graph (0, 0)][DBLP]
    DRMTICS, 2005, pp:75-89 [Conf]
  7. Ying Sha
    AVS-REL - A New Right Expression Language. [Citation Graph (0, 0)][DBLP]
    DRMTICS, 2005, pp:90-101 [Conf]
  8. Kailash Bhoopalam, Kurt Maly, Ravi Mukkamala, Mohammad Zubair, D. Agrawal, D. Kaminsky
    A Comparative Study of Specification Models for Autonomic Access Control of Digital Rights. [Citation Graph (0, 0)][DBLP]
    DRMTICS, 2005, pp:102-112 [Conf]
  9. Yanjun Hu, Xiaoping Ma, Linming Dou, Ying Chen
    The Effect of Fidelity Measure Functions on the Capacity of Digital Watermarks. [Citation Graph (0, 0)][DBLP]
    DRMTICS, 2005, pp:113-122 [Conf]
  10. Hongmei Liu, Fenglian Shao, Jiwu Huang
    A MPEG-2 Video Watermarking Algorithm with Compensation in Bit Stream. [Citation Graph (0, 0)][DBLP]
    DRMTICS, 2005, pp:123-134 [Conf]
  11. Xiaoyun Wu, Xiaoping Liang, Hongmei Liu, Jiwu Huang, Guoping Qiu
    Reversible Semi-fragile Image Authentication Using Zernike Moments and Integer Wavelet Transform. [Citation Graph (0, 0)][DBLP]
    DRMTICS, 2005, pp:135-145 [Conf]
  12. Brian Blietz, Akhilesh Tyagi
    Software Tamper Resistance Through Dynamic Program Monitoring. [Citation Graph (0, 0)][DBLP]
    DRMTICS, 2005, pp:146-163 [Conf]
  13. Valery Pryamikov
    Call Tree Transformation for Program Obfuscation and Copy Protection. [Citation Graph (0, 0)][DBLP]
    DRMTICS, 2005, pp:164-179 [Conf]
  14. William Zhu, Clark D. Thomborson
    Algorithms to Watermark Software Through Register Allocation. [Citation Graph (0, 0)][DBLP]
    DRMTICS, 2005, pp:180-191 [Conf]
  15. Seunglim Yong, Sang-Ho Lee
    An Efficient Fingerprinting Scheme with Secret Sharing. [Citation Graph (0, 0)][DBLP]
    DRMTICS, 2005, pp:192-202 [Conf]
  16. Takaaki Mizuki, Satoshi Nounin, Hideaki Sone, Yousuke Toyota
    Worst-Case Optimal Fingerprinting Codes for Non-threshold Collusion. [Citation Graph (0, 0)][DBLP]
    DRMTICS, 2005, pp:203-216 [Conf]
  17. Taehae Kim, Yongwha Chung, Seunghwan Jung, Daesung Moon
    Secure Remote Fingerprint Verification Using Dual Watermarks. [Citation Graph (0, 0)][DBLP]
    DRMTICS, 2005, pp:217-227 [Conf]
  18. Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai
    Security Weaknesses of Certain Broadcast Encryption Schemes. [Citation Graph (0, 0)][DBLP]
    DRMTICS, 2005, pp:228-245 [Conf]
  19. André Adelsbach, Ulrich Greveler
    A Broadcast Encryption Scheme with Free-Riders but Unconditional Security. [Citation Graph (0, 0)][DBLP]
    DRMTICS, 2005, pp:246-257 [Conf]
  20. Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai
    A Novel Broadcast Encryption Based on Time-Bound Cryptographic Keys. [Citation Graph (0, 0)][DBLP]
    DRMTICS, 2005, pp:258-276 [Conf]
  21. Jacques J. A. Fournier, Simon W. Moore
    A Vector Approach to Cryptography Implementation. [Citation Graph (0, 0)][DBLP]
    DRMTICS, 2005, pp:277-297 [Conf]
  22. Xiaoming Wang, Bin Zhu, Shipeng Li
    A Novel Privacy and Copyright Protection Enforced Peer-to-Peer Network. [Citation Graph (0, 0)][DBLP]
    DRMTICS, 2005, pp:298-310 [Conf]
  23. Youngho Park, Jung-Hwa Shin, Kyung Hyune Rhee
    Design of a Secure Digital Contents Delivery System in P2P Networks. [Citation Graph (0, 0)][DBLP]
    DRMTICS, 2005, pp:311-321 [Conf]
  24. Jong-Weon Kim, Dong-Hwan Shin, Jong-Uk Choi
    Real-Time Implementation of Broadcast Switching System Using Audio Watermark. [Citation Graph (0, 0)][DBLP]
    DRMTICS, 2005, pp:322-331 [Conf]
  25. Ulrich Greveler
    Enforcing Regional DRM for Multimedia Broadcasts With and Without Trusted Computing. [Citation Graph (0, 0)][DBLP]
    DRMTICS, 2005, pp:332-340 [Conf]
  26. Bin B. Zhu, Yang Yang, Tierui Chen
    A DRM System Supporting What You See Is What You Pay. [Citation Graph (0, 0)][DBLP]
    DRMTICS, 2005, pp:341-355 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002