Digital Rights Management. Technologies, Issues, Challenges and Systems First International Conference, DRMTICS 2005, Sydney, Australia, October 31 - November 2, 2005. Revised Selected Papers /
The First International Conference on Digital Rights Management: Technology, Issues, Challenges and Systems (DRMTICS – pronounced ‘dramatics’), took place in Sydney, Australia on 31st October - 2nd November, 2005. It was or- nized by the Centre for Information Security of the University of Wollongon...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2006.
|
Σειρά: | Lecture Notes in Computer Science,
3919 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Assurance and Authentication Issues
- A Novel Framework for Multiple Creatorship Protection of Digital Movies
- TIVA: Trusted Integrity Verification Architecture
- Legal and Related Issues
- The Australian Sony PlayStation Case: How Far Will Anti-circumvention Law Reach in the Name of DRM?
- Downloading vs Purchase: Music Industry vs Consumers
- Digital Rights Management: Merging Contract, Copyright and Criminal Law
- Expressing Rights and Management
- User-Attributed Rights in DRM
- AVS-REL—A New Right Expression Language
- A Comparative Study of Specification Models for Autonomic Access Control of Digital Rights
- Watermarking
- The Effect of Fidelity Measure Functions on the Capacity of Digital Watermarks
- A MPEG-2 Video Watermarking Algorithm with Compensation in Bit Stream
- Reversible Semi-fragile Image Authentication Using Zernike Moments and Integer Wavelet Transform
- Software Issues
- Software Tamper Resistance Through Dynamic Program Monitoring
- Call Tree Transformation for Program Obfuscation and Copy Protection
- Algorithms to Watermark Software Through Register Allocation
- Fingerprinting and Image Authentication
- An Efficient Fingerprinting Scheme with Secret Sharing
- Worst-Case Optimal Fingerprinting Codes for Non-threshold Collusion
- Secure Remote Fingerprint Verification Using Dual Watermarks
- Supporting Cryptographic Technology
- Security Weaknesses of Certain Broadcast Encryption Schemes
- A Broadcast Encryption Scheme with Free-Riders but Unconditional Security
- A Novel Broadcast Encryption Based on Time-Bound Cryptographic Keys
- A Vector Approach to Cryptography Implementation
- P2P Issues
- A Novel Privacy and Copyright Protection Enforced Peer-to-Peer Network
- Design of a Secure Digital Contents Delivery System in P2P Networks
- Implementations and Architectures
- Real-Time Implementation of Broadcast Switching System Using Audio Watermark
- Enforcing Regional DRM for Multimedia Broadcasts With and Without Trusted Computing
- A DRM System Supporting What You See Is What You Pay.