-
1
-
-
2542617840
-
Copyrighting computer software: The look and feel controversy and beyond
-
Bordoloi B, Ilami P, Mykytyn PP, Mykytyn K. Copyrighting computer software: The look and feel controversy and beyond. Information and Management, 1996, 30(5): 211-221.
-
(1996)
Information and Management
, vol.30
, Issue.5
, pp. 211-221
-
-
Bordoloi, B.1
Ilami, P.2
Mykytyn, P.P.3
Mykytyn, K.4
-
3
-
-
0032292125
-
Digital watermarking of text, image, and video documents
-
Su JK, Hartung F, Girod B. Digital watermarking of text, image, and video documents. Computers and Graphics, 1998, 22(6): 687-695.
-
(1998)
Computers and Graphics
, vol.22
, Issue.6
, pp. 687-695
-
-
Su, J.K.1
Hartung, F.2
Girod, B.3
-
4
-
-
0346396224
-
Cryptographic copyright protection for digital images based on watermarking techniques
-
Ruanaidh JO, Petersen H, Herrigel A, Pereira S, Pun T. Cryptographic copyright protection for digital images based on watermarking techniques. Theoretical Computer Science, 1999, 226(1-2): 117-142.
-
(1999)
Theoretical Computer Science
, vol.226
, Issue.1-2
, pp. 117-142
-
-
Ruanaidh, J.O.1
Petersen, H.2
Herrigel, A.3
Pereira, S.4
Pun, T.5
-
5
-
-
0035254635
-
Automatic proxy-based watermarking for WWW
-
Chi CH, Lin Y, Deng J, Li X, Chua TS. Automatic proxy-based watermarking for WWW. Computer Communications, 2000, 24(2): 144-154.
-
(2000)
Computer Communications
, vol.24
, Issue.2
, pp. 144-154
-
-
Chi, C.H.1
Lin, Y.2
Deng, J.3
Li, X.4
Chua, T.S.5
-
6
-
-
0035148984
-
Digital watermarking models for resolving rightful ownership and authenticating legitimate customer
-
Lin PL. Digital watermarking models for resolving rightful ownership and authenticating legitimate customer. Journal of Systems and Software, 2001, 55(3): 261-271.
-
(2001)
Journal of Systems and Software
, vol.55
, Issue.3
, pp. 261-271
-
-
Lin, P.L.1
-
7
-
-
0037096996
-
A public verifiable copy protection technique for still images
-
Lee WB, Chen TH. A public verifiable copy protection technique for still images. Journal of Systems and Software, 2002, 62(3): 195-204.
-
(2002)
Journal of Systems and Software
, vol.62
, Issue.3
, pp. 195-204
-
-
Lee, W.B.1
Chen, T.H.2
-
8
-
-
0035311789
-
An overview of multimedia content protection in consumer electronics devices
-
Eskicioglu AM, Delp EJ. An overview of multimedia content protection in consumer electronics devices. Signal Processing: Image Communication, 2001, 16(7): 681-699.
-
(2001)
Signal Processing: Image Communication
, vol.16
, Issue.7
, pp. 681-699
-
-
Eskicioglu, A.M.1
Delp, E.J.2
-
9
-
-
0036806713
-
Securing the delivery of digital content over the Internet
-
Waller AO, Jones G, Whitley T, Edwards J, Kaleshi D, Munro A, MacFarlane B, Wood A. Securing the delivery of digital content over the Internet. Electronics and Communication Engineering Journal, 2002, 14(5): 239-248.
-
(2002)
Electronics and Communication Engineering Journal
, vol.14
, Issue.5
, pp. 239-248
-
-
Waller, A.O.1
Jones, G.2
Whitley, T.3
Edwards, J.4
Kaleshi, D.5
Munro, A.6
MacFarlane, B.7
Wood, A.8
-
10
-
-
0036028058
-
Cryptographic methods for collusion-secure fingerprinting of digital data
-
Biehl I, Meyer B. Cryptographic methods for collusion-secure fingerprinting of digital data. Computers and Electrical Engineering, 2002, 28(1): 59-75.
-
(2002)
Computers and Electrical Engineering
, vol.28
, Issue.1
, pp. 59-75
-
-
Biehl, I.1
Meyer, B.2
-
11
-
-
0347485721
-
Acceptable protection of software intellectual property: A survey of software developers and lawyers
-
Oz E. Acceptable protection of software intellectual property: A survey of software developers and lawyers. Information and Management, 1998, 34(3): 161-173.
-
(1998)
Information and Management
, vol.34
, Issue.3
, pp. 161-173
-
-
Oz, E.1
-
12
-
-
0036736138
-
The optimal level of copyright protection
-
Yoon K. The optimal level of copyright protection. Information Economics and Policy, 2002, 14(3): 327-348.
-
(2002)
Information Economics and Policy
, vol.14
, Issue.3
, pp. 327-348
-
-
Yoon, K.1
-
13
-
-
2542628407
-
SafeDisk: 128bit on-the-fly disk encryption
-
SafeDisk: 128bit on-the-fly disk encryption. http://www.guardcomplete.com
-
-
-
-
14
-
-
25744450205
-
Internet security software, security software, software encryption protection, password protection
-
Rainbow. Internet security software, security software, software encryption protection, password protection. http://www.rainbow.com
-
-
-
Rainbow1
-
15
-
-
2542593428
-
Crypkey. Copy protection and license control
-
Crypkey. Copy protection and license control. http://www.crypkey.com
-
-
-
-
16
-
-
2542581111
-
Softkey. The key to software development success
-
Softkey. The key to software development success. http://www.rockey.com.my/index.htm
-
-
-
|