The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jeffrey B. Lotspiech: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ulrich Kohl, Jeffrey B. Lotspiech, Marc A. Kaplan
    Safeguarding Digital Library Contents and Users: Protecting Documents Rather Than Channels. [Citation Graph (1, 0)][DBLP]
    D-Lib Magazine, 1997, v:3, n:9, pp:- [Journal]
  2. David M. Choy, Richard Dievendorff, Cynthia Dwork, Jeffrey B. Lotspiech, Robert J. T. Morris, Norman J. Pass, Laura C. Anderson, Alan E. Bell, Stephen K. Boyer, Thomas D. Griffin, Bruce A. Hoenig, James M. McCrossin, Alex M. Miller, Florian Pestoni, Deidra S. Picciano
    The Almaden Distributed Digital Library System. [Citation Graph (0, 0)][DBLP]
    ADL, 1995, pp:203-220 [Conf]
  3. David M. Choy, Cynthia Dwork, Jeffrey B. Lotspiech, Laura C. Anderson, Stephen K. Boyer, Richard Dievendorff, Thomas D. Griffin, Bruce A. Hoenig, M. J. Jackson, W. Kaka, James M. McCrossin, Alex M. Miller, Robert J. T. Morris, Norman J. Pass
    A Digital Library System for Periodicals Distribution. [Citation Graph (0, 0)][DBLP]
    ADL, 1996, pp:95-103 [Conf]
  4. Ulrich Kohl, Jeffrey B. Lotspiech, Stefan Nusser
    Security for the Digital Library - Protecting Documents Rather than Channels. [Citation Graph (0, 0)][DBLP]
    DEXA Workshop, 1998, pp:316-321 [Conf]
  5. Hongxia Jin, Jeffory B. Lotspiech, Mario Blaum
    Traitor Tracing for Subscription-Based Systems. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:223-228 [Conf]
  6. Yitzhak Birk, Jeffrey B. Lotspiech
    A Fast Algorithm for Connecting Grid Points to the Boundary with Nonintersecting Straight Lines. [Citation Graph (0, 0)][DBLP]
    SODA, 1991, pp:465-474 [Conf]
  7. Cynthia Dwork, Jeffrey B. Lotspiech, Moni Naor
    Digital Signets: Self-Enforcing Protection of Digital Information (Preliminary Version). [Citation Graph (0, 0)][DBLP]
    STOC, 1996, pp:489-498 [Conf]
  8. Jeffrey B. Lotspiech, Stefan Nusser, Florian Pestoni
    Broadcast Encryption's Bright Future. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2002, v:35, n:8, pp:57-63 [Journal]
  9. Yitzhak Birk, Jeffrey B. Lotspiech
    On Finding Non-Intersecting Straightline Connections of Grid Points to the Boundary. [Citation Graph (0, 0)][DBLP]
    J. Algorithms, 1992, v:13, n:4, pp:636-656 [Journal]
  10. Jeffrey B. Lotspiech, Stefan Nusser, Florian Pestoni
    Anonymous Trust: Digital Rights Management Using Broadcast Encryption. [Citation Graph (0, 0)][DBLP]
    Proceedings of the IEEE, 2004, v:92, n:6, pp:898-909 [Journal]

  11. Unifying Broadcast Encryption and Traitor Tracing for Content Protection. [Citation Graph (, )][DBLP]


  12. Adaptive traitor tracing for large anonymous attack. [Citation Graph (, )][DBLP]


  13. Broadcast encryption versus public key cryptography in content protection systems. [Citation Graph (, )][DBLP]


  14. Defending against the Pirate Evolution Attack. [Citation Graph (, )][DBLP]


  15. Practical tracing traitors. [Citation Graph (, )][DBLP]


Search in 0.016secs, Finished in 0.017secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002