A Novel Privacy and Copyright Protection Enforced Peer-to-Peer Network (English)
- New search for: Wang, X.
- New search for: Zhu, B.
- New search for: Li, S.
- New search for: Wang, X.
- New search for: Zhu, B.
- New search for: Li, S.
- New search for: Safavi-Naini, Reihanah
- New search for: Yung, Moti
-
ISBN:
-
ISSN:
- Conference paper / Print
-
Title:A Novel Privacy and Copyright Protection Enforced Peer-to-Peer Network
-
Contributors:
-
Conference:International conference; 1st, Digital rights management : technology issues, challenges and systems; Digital rights management : technologies issues challenges and systems: first International Conference, DRMTICS 2005 Sydney, Australia, October 31 - November 2, 2005, revised selected papers / ; 2005 ; Sydney, Australia
-
Published in:LECTURE NOTES IN COMPUTER SCIENCE , 3919 ; 298-310
-
Publisher:
- New search for: Springer
-
Place of publication:Berlin
-
Publication date:2006-01-01
-
Size:13 pages
-
Remarks:Based on those presented at the conference. Includes bibliographical references and index.
-
ISBN:
-
ISSN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
A Novel Framework for Multiple Creatorship Protection of Digital MoviesZhang, Y.-Q. / Emmanuel, S. et al. | 2006
- 13
-
TIVA: Trusted Integrity Verification ArchitectureGomathisankaran, M. / Tyagi, A. et al. | 2006
- 32
-
The Australian Sony PlayStation Case: How Far Will Anti-circumvention Law Reach in the Name of DRM?Fitzgerald, B. et al. | 2006
- 52
-
Downloading vs Purchase: Music Industry vs ConsumersSingh, S. / Jackson, M. / Waycott, J. / Beekhuyzen, J. et al. | 2006
- 66
-
Digital Rights Management: Merging Contract, Copyright and Criminal LawLim, Y. F. et al. | 2006
- 75
-
User-Attributed Rights in DRMPetkovic, M. / Koster, R. P. et al. | 2006
- 90
-
AVS-REL-A New Right Expression LanguageSha, Y. et al. | 2006
- 102
-
A Comparative Study of Specification Models for Autonomic Access Control of Digital RightsBhoopalam, K. / Maly, K. / Mukkamala, R. / Zubair, M. / Agrawal, D. / Kaminsky, D. et al. | 2006
- 113
-
The Effect of Fidelity Measure Functions on the Capacity of Digital WatermarksHu, Y. / Ma, X. / Dou, L. / Chen, Y. et al. | 2006
- 123
-
A MPEG-2 Video Watermarking Algorithm with Compensation in Bit StreamLiu, H. / Shao, F. / Huang, J. et al. | 2006
- 135
-
Reversible Semi-fragile Image Authentication Using Zernike Moments and Integer Wavelet TransformWu, X. / Liang, X. / Liu, H. / Huang, J. / Qiu, G. et al. | 2006
- 146
-
Software Tamper Resistance Through Dynamic Program MonitoringBlietz, B. / Tyagi, A. et al. | 2006
- 164
-
Call Tree Transformation for Program Obfuscation and Copy ProtectionPryamikov, V. et al. | 2006
- 180
-
Algorithms to Watermark Software Through Register AllocationZhu, W. / Thomborson, C. et al. | 2006
- 192
-
An Efficient Fingerprinting Scheme with Secret SharingYong, S. / Lee, S.-H. et al. | 2006
- 203
-
Worst-Case Optimal Fingerprinting Codes for Non-threshold CollusionMizuki, T. / Nounin, S. / Sone, H. / Toyota, Y. et al. | 2006
- 217
-
Secure Remote Fingerprint Verification Using Dual WatermarksKim, T. / Chung, Y. / Jung, S. / Moon, D. et al. | 2006
- 228
-
Security Weaknesses of Certain Broadcast Encryption SchemesMihaljevic, M. J. / Fossorier, M. P. C. / Imai, H. et al. | 2006
- 246
-
A Broadcast Encryption Scheme with Free-Riders but Unconditional SecurityAdelsbach, A. / Greveler, U. et al. | 2006
- 258
-
A Novel Broadcast Encryption Based on Time-Bound Cryptographic KeysMihaljevic, M. J. / Fossorier, M. P. C. / Imai, H. et al. | 2006
- 277
-
A Vector Approach to Cryptography ImplementationFournier, J. J. A. / Moore, S. et al. | 2006
- 298
-
A Novel Privacy and Copyright Protection Enforced Peer-to-Peer NetworkWang, X. / Zhu, B. / Li, S. et al. | 2006
- 311
-
Design of a Secure Digital Contents Delivery System in P2P NetworksPark, Y.-H. / Shin, J.-H. / Rhee, K.-H. et al. | 2006
- 322
-
Real-Time Implementation of Broadcast Switching System Using Audio WatermarkKim, J. / Shin, D. / Choi, J. et al. | 2006
- 332
-
Enforcing Regional DRM for Multimedia Broadcasts With and Without Trusted ComputingGreveler, U. et al. | 2006
- 341
-
A DRM System Supporting What You See Is What You PayZhu, B. B. / Yang, Y. / Chen, T. et al. | 2006