Digital Rights Management Technologies, Issues, Challenges and Systems /
The First International Conference on Digital Rights Management: Technology, Issues, Challenges and Systems (DRMTICS - pronounced 'dramatics'), took place in Sydney, Australia on 31st October - 2nd November, 2005. It was or- nized by the Centre for Information Security of the University of...
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2006.
|
Edición: | 1st ed. 2006. |
Colección: | Security and Cryptology ;
3919 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Assurance and Authentication Issues
- A Novel Framework for Multiple Creatorship Protection of Digital Movies
- TIVA: Trusted Integrity Verification Architecture
- Legal and Related Issues
- The Australian Sony PlayStation Case: How Far Will Anti-circumvention Law Reach in the Name of DRM?
- Downloading vs Purchase: Music Industry vs Consumers
- Digital Rights Management: Merging Contract, Copyright and Criminal Law
- Expressing Rights and Management
- User-Attributed Rights in DRM
- AVS-REL-A New Right Expression Language
- A Comparative Study of Specification Models for Autonomic Access Control of Digital Rights
- Watermarking
- The Effect of Fidelity Measure Functions on the Capacity of Digital Watermarks
- A MPEG-2 Video Watermarking Algorithm with Compensation in Bit Stream
- Reversible Semi-fragile Image Authentication Using Zernike Moments and Integer Wavelet Transform
- Software Issues
- Software Tamper Resistance Through Dynamic Program Monitoring
- Call Tree Transformation for Program Obfuscation and Copy Protection
- Algorithms to Watermark Software Through Register Allocation
- Fingerprinting and Image Authentication
- An Efficient Fingerprinting Scheme with Secret Sharing
- Worst-Case Optimal Fingerprinting Codes for Non-threshold Collusion
- Secure Remote Fingerprint Verification Using Dual Watermarks
- Supporting Cryptographic Technology
- Security Weaknesses of Certain Broadcast Encryption Schemes
- A Broadcast Encryption Scheme with Free-Riders but Unconditional Security
- A Novel Broadcast Encryption Based on Time-Bound Cryptographic Keys
- A Vector Approach to Cryptography Implementation
- P2P Issues
- A Novel Privacy and Copyright Protection Enforced Peer-to-Peer Network
- Design of a Secure Digital Contents Delivery System in P2P Networks
- Implementations and Architectures
- Real-Time Implementation of Broadcast Switching System Using Audio Watermark
- Enforcing Regional DRM for Multimedia Broadcasts With and Without Trusted Computing
- A DRM System Supporting What You See Is What You Pay.