Digital Rights Management. Technologies, Issues, Challenges and Systems First International Conference, DRMTICS 2005, Sydney, Australia, October 31 - November 2, 2005. Revised Selected Papers /

The First International Conference on Digital Rights Management: Technology, Issues, Challenges and Systems (DRMTICS – pronounced ‘dramatics’), took place in Sydney, Australia on 31st October - 2nd November, 2005. It was or- nized by the Centre for Information Security of the University of Wollongon...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Safavi-Naini, Reihaneh (Επιμελητής έκδοσης), Yung, Moti (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2006.
Σειρά:Lecture Notes in Computer Science, 3919
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Assurance and Authentication Issues
  • A Novel Framework for Multiple Creatorship Protection of Digital Movies
  • TIVA: Trusted Integrity Verification Architecture
  • Legal and Related Issues
  • The Australian Sony PlayStation Case: How Far Will Anti-circumvention Law Reach in the Name of DRM?
  • Downloading vs Purchase: Music Industry vs Consumers
  • Digital Rights Management: Merging Contract, Copyright and Criminal Law
  • Expressing Rights and Management
  • User-Attributed Rights in DRM
  • AVS-REL—A New Right Expression Language
  • A Comparative Study of Specification Models for Autonomic Access Control of Digital Rights
  • Watermarking
  • The Effect of Fidelity Measure Functions on the Capacity of Digital Watermarks
  • A MPEG-2 Video Watermarking Algorithm with Compensation in Bit Stream
  • Reversible Semi-fragile Image Authentication Using Zernike Moments and Integer Wavelet Transform
  • Software Issues
  • Software Tamper Resistance Through Dynamic Program Monitoring
  • Call Tree Transformation for Program Obfuscation and Copy Protection
  • Algorithms to Watermark Software Through Register Allocation
  • Fingerprinting and Image Authentication
  • An Efficient Fingerprinting Scheme with Secret Sharing
  • Worst-Case Optimal Fingerprinting Codes for Non-threshold Collusion
  • Secure Remote Fingerprint Verification Using Dual Watermarks
  • Supporting Cryptographic Technology
  • Security Weaknesses of Certain Broadcast Encryption Schemes
  • A Broadcast Encryption Scheme with Free-Riders but Unconditional Security
  • A Novel Broadcast Encryption Based on Time-Bound Cryptographic Keys
  • A Vector Approach to Cryptography Implementation
  • P2P Issues
  • A Novel Privacy and Copyright Protection Enforced Peer-to-Peer Network
  • Design of a Secure Digital Contents Delivery System in P2P Networks
  • Implementations and Architectures
  • Real-Time Implementation of Broadcast Switching System Using Audio Watermark
  • Enforcing Regional DRM for Multimedia Broadcasts With and Without Trusted Computing
  • A DRM System Supporting What You See Is What You Pay.