|
|
|
|
LEADER |
03916nam a2200601 4500 |
001 |
978-3-540-44993-5 |
003 |
DE-He213 |
005 |
20191021201131.0 |
007 |
cr nn 008mamaa |
008 |
121227s2003 gw | s |||| 0|eng d |
020 |
|
|
|a 9783540449935
|9 978-3-540-44993-5
|
024 |
7 |
|
|a 10.1007/b11725
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.D335
|
072 |
|
7 |
|a GPJ
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a GPJ
|2 thema
|
072 |
|
7 |
|a URY
|2 thema
|
082 |
0 |
4 |
|a 005.82
|2 23
|
245 |
1 |
0 |
|a Digital Rights Management
|h [electronic resource] :
|b ACM CCS-9 Workshop, DRM 2002, Washington, DC, USA, November 18, 2002, Revised Papers /
|c edited by Joan Feigenbaum.
|
250 |
|
|
|a 1st ed. 2003.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2003.
|
300 |
|
|
|a X, 222 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 2696
|
505 |
0 |
|
|a ACM DRM 2002 -- A White-Box DES Implementation for DRM Applications -- Attacking an Obfuscated Cipher by Injecting Faults -- Breaking and Repairing Asymmetric Public-Key Traitor Tracing -- Key Challenges in DRM: An Industry Perspective -- Public Key Broadcast Encryption for Stateless Receivers -- Traitor Tracing for Shortened and Corrupted Fingerprints -- Evaluating New Copy-Prevention Techniques for Audio CDs -- Towards Meeting the Privacy Challenge: Adapting DRM -- Implementing Copyright Limitations in Rights Expression Languages -- The Darknet and the Future of Content Protection -- Replacement Attack on Arbitrary Watermarking Systems -- FAIR: Fair Audience InfeRence -- Theft-Protected Proprietary Certificates.
|
520 |
|
|
|a This book constitutes the thoroughly refereed post-proceedings of the Second International Workshop on Digital Rights Management, DRM 2002, held in Washington, DC, USA, in November 2002, in conjunction with ACM CCS-9. The 13 revised full papers presented were carefully reviewed and selected for inclusion in the book. Among the topics addressed are DES implementation for DRM applications, cryptographic attacks, industrial challenges, public key broadcast encryption, fingerprinting, copy-prevention techniques, copyright limitations, content protection, watermarking systems, and theft-protected proprietary certificates.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Operating systems (Computers).
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
|
0 |
|a Computers.
|
650 |
|
0 |
|a Law and legislation.
|
650 |
1 |
4 |
|a Cryptology.
|0 http://scigraph.springernature.com/things/product-market-codes/I28020
|
650 |
2 |
4 |
|a Computer Communication Networks.
|0 http://scigraph.springernature.com/things/product-market-codes/I13022
|
650 |
2 |
4 |
|a Science, Humanities and Social Sciences, multidisciplinary.
|0 http://scigraph.springernature.com/things/product-market-codes/A11007
|
650 |
2 |
4 |
|a Operating Systems.
|0 http://scigraph.springernature.com/things/product-market-codes/I14045
|
650 |
2 |
4 |
|a Computers and Society.
|0 http://scigraph.springernature.com/things/product-market-codes/I24040
|
650 |
2 |
4 |
|a Legal Aspects of Computing.
|0 http://scigraph.springernature.com/things/product-market-codes/I24059
|
700 |
1 |
|
|a Feigenbaum, Joan.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783662167090
|
776 |
0 |
8 |
|i Printed edition:
|z 9783540404101
|
830 |
|
0 |
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 2696
|
856 |
4 |
0 |
|u https://doi.org/10.1007/b11725
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
912 |
|
|
|a ZDB-2-BAE
|
950 |
|
|
|a Computer Science (Springer-11645)
|