Cargando…

Digital Rights Management Technologies, Issues, Challenges and Systems /

The First International Conference on Digital Rights Management: Technology, Issues, Challenges and Systems (DRMTICS - pronounced 'dramatics'), took place in Sydney, Australia on 31st October - 2nd November, 2005. It was or- nized by the Centre for Information Security of the University of...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Safavi-Naini, Reihaneh (Editor ), Yung, Moti (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2006.
Edición:1st ed. 2006.
Colección:Security and Cryptology ; 3919
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Assurance and Authentication Issues
  • A Novel Framework for Multiple Creatorship Protection of Digital Movies
  • TIVA: Trusted Integrity Verification Architecture
  • Legal and Related Issues
  • The Australian Sony PlayStation Case: How Far Will Anti-circumvention Law Reach in the Name of DRM?
  • Downloading vs Purchase: Music Industry vs Consumers
  • Digital Rights Management: Merging Contract, Copyright and Criminal Law
  • Expressing Rights and Management
  • User-Attributed Rights in DRM
  • AVS-REL-A New Right Expression Language
  • A Comparative Study of Specification Models for Autonomic Access Control of Digital Rights
  • Watermarking
  • The Effect of Fidelity Measure Functions on the Capacity of Digital Watermarks
  • A MPEG-2 Video Watermarking Algorithm with Compensation in Bit Stream
  • Reversible Semi-fragile Image Authentication Using Zernike Moments and Integer Wavelet Transform
  • Software Issues
  • Software Tamper Resistance Through Dynamic Program Monitoring
  • Call Tree Transformation for Program Obfuscation and Copy Protection
  • Algorithms to Watermark Software Through Register Allocation
  • Fingerprinting and Image Authentication
  • An Efficient Fingerprinting Scheme with Secret Sharing
  • Worst-Case Optimal Fingerprinting Codes for Non-threshold Collusion
  • Secure Remote Fingerprint Verification Using Dual Watermarks
  • Supporting Cryptographic Technology
  • Security Weaknesses of Certain Broadcast Encryption Schemes
  • A Broadcast Encryption Scheme with Free-Riders but Unconditional Security
  • A Novel Broadcast Encryption Based on Time-Bound Cryptographic Keys
  • A Vector Approach to Cryptography Implementation
  • P2P Issues
  • A Novel Privacy and Copyright Protection Enforced Peer-to-Peer Network
  • Design of a Secure Digital Contents Delivery System in P2P Networks
  • Implementations and Architectures
  • Real-Time Implementation of Broadcast Switching System Using Audio Watermark
  • Enforcing Regional DRM for Multimedia Broadcasts With and Without Trusted Computing
  • A DRM System Supporting What You See Is What You Pay.