The SCEAS System
Navigation Menu

Conferences in DBLP

Conference on Computer and Communications Security (CCS) (ccs)
2001 (conf/ccs/2001drm)

  1. Markus Jakobsson, Michael K. Reiter
    Discouraging Software Piracy Using Software Aging. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2001, pp:1-12 [Conf]
  2. Mehmet Kivanç Mihçak, Ramarathnam Venkatesan
    New Iterative Geometric Methods for Robust Perceptual Image Hashing. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2001, pp:13-21 [Conf]
  3. Aggelos Kiayias, Moti Yung
    On Crafty Pirates and Foxy Tracers. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2001, pp:22-39 [Conf]
  4. Benny Pinkas
    Efficient State Updates for Key Management. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2001, pp:40-56 [Conf]
  5. Reihaneh Safavi-Naini, Yejing Wang
    Collusion Secure q-ary Fingerprinting for Perceptual Content. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2001, pp:57-75 [Conf]
  6. Joan Feigenbaum, Michael J. Freedman, Tomas Sander, Adam Shostack
    Privacy Engineering for Digital Rights Management Systems. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2001, pp:76-105 [Conf]
  7. David W. Kravitz, Kim-Ee Yeoh, Nicol So
    Secure Open Systems for Protecting Privacy and Digital Services. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2001, pp:106-125 [Conf]
  8. James King, Panos Kudumakis
    MPEG-4 IPMP Extensions. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2001, pp:126-140 [Conf]
  9. Bill G. Horne, Lesley R. Matheson, Casey Sheehan, Robert Endre Tarjan
    Dynamic Self-Checking Techniques for Improved Tamper Resistance. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2001, pp:141-159 [Conf]
  10. Hoi Chang, Mikhail J. Atallah
    Protecting Software Code by Guards. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2001, pp:160-175 [Conf]
  11. William Shapiro, Radek Vingralek
    How to Manage Persistent State in DRM Systems. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2001, pp:176-191 [Conf]
  12. Scott Crosby, Ian Goldberg, Robert Johnson, Dawn Xiaodong Song, David Wagner
    A Cryptanalysis of the High-Bandwidth Digital Content Protection System. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2001, pp:192-200 [Conf]
  13. Willms Buhse
    Implications of Digital Rights Management for Online Music - A Business Perspective. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2001, pp:201-212 [Conf]
  14. Stefan Bechtold
    From Copyright to Information Law - Implications of Digital Rights Management. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2001, pp:213-232 [Conf]
  15. Ernest Miller, Joan Feigenbaum
    Taking the Copy Out of Copyright. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2001, pp:233-244 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002