-
1
-
-
84877628849
-
-
Available
-
Apple iTunes, Available: http://www.apple.com.tw/itunes/
-
Apple iTunes
-
-
-
3
-
-
78650035684
-
Privacy in an Identity-based DRM System
-
C. Conrado, F. Kamperman, C. J. Schrijen, and W. Jonker, "Privacy in an Identity-based DRM System," in Proceedings of the 14th IEEE Int. Workshop on Database and Expert Systems Applications, 2003, pp. 389-395.
-
(2003)
Proceedings of the 14th IEEE Int. Workshop on Database and Expert Systems Applications
, pp. 389-395
-
-
Conrado, C.1
Kamperman, F.2
Schrijen, C.J.3
Jonker, W.4
-
4
-
-
0346238887
-
DRM and Privacy
-
April
-
J. E. Cohen, "DRM and Privacy," Communications of the ACM, vol. 46, no. 4, April, 2003, pp. 46-49.
-
(2003)
Communications of the ACM
, vol.46
, Issue.4
, pp. 46-49
-
-
Cohen, J.E.1
-
5
-
-
33847109177
-
-
Electronic privacy information center, March 29, Available
-
Electronic privacy information center (2004, March 29). Digital Rights Management and Privacy. Available: http://www.epic.org/privacy/drm/
-
(2004)
Digital Rights Management and Privacy
-
-
-
6
-
-
4243136065
-
Fair use, DRM, and Trusted Computing
-
April
-
J. S. Erickson, "Fair use, DRM, and Trusted Computing," Communications of the ACM, vol. 46, no. 4, April, 2003, pp. 34-39.
-
(2003)
Communications of the ACM
, vol.46
, Issue.4
, pp. 34-39
-
-
Erickson, J.S.1
-
7
-
-
84959058818
-
Privacy Engineering for Digital Rights Management Systems
-
J. Feigenbaum, M. J. Freedman, T. Sander, and A. Shostack, "Privacy Engineering for Digital Rights Management Systems," in Proceedings of the 6th ACM Workshop on Digital Right Management, 2001. pp. 76-105.
-
(2001)
Proceedings of the 6th ACM Workshop on Digital Right Management
, pp. 76-105
-
-
Feigenbaum, J.1
Freedman, M.J.2
Sander, T.3
Shostack, A.4
-
9
-
-
0005097206
-
Digital Rights Management (DRM) Architectures
-
June, Available
-
R. Iannella. (2001 June). Digital Rights Management (DRM) Architectures. D-Lab Magazine, vol.7 no.6, Available: http://www.dlib.org/dlib/june01/ iannella/06iannella.html
-
(2001)
D-Lab Magazine
, vol.7
, Issue.6
-
-
Iannella, R.1
-
12
-
-
34748893968
-
-
Available
-
Microsoft DRM, Available: http://www.microsoft.com/windows/windowsmedia/ drm/default.aspx
-
Microsoft DRM
-
-
-
13
-
-
84860935008
-
-
Microsoft Windows media, Available
-
Microsoft Windows media, "Windows Media Player for Windows XP privacy statement", Available: http://www.microsoft.com/windows/ windowsmedia/software/v8/privacy.aspx
-
Windows Media Player for Windows XP privacy statement
-
-
-
14
-
-
11144292628
-
How DRM-Based Content Delivery Systems Disrupt Expectations of Personal Use
-
D. K. Mulligan, J. Han, and A. J. Burstein, "How DRM-Based Content Delivery Systems Disrupt Expectations of Personal Use," in Proceedings of the 8th ACM Workshop on Digital Right Management, 2003, pp. 77-89.
-
(2003)
Proceedings of the 8th ACM Workshop on Digital Right Management
, pp. 77-89
-
-
Mulligan, D.K.1
Han, J.2
Burstein, A.J.3
-
15
-
-
34748867511
-
-
OMA DRM, Available: http://www.openmobilealliance.org/
-
OMA DRM, Available: http://www.openmobilealliance.org/
-
-
-
-
16
-
-
21244449140
-
Legal Policy and Digital Rights Management
-
June
-
R. Owens and R. Akalu, "Legal Policy and Digital Rights Management," Proceedings of the IEEE, vol. 92, issue 6, June, 2004, pp. 997-1003.
-
(2004)
Proceedings of the IEEE
, vol.92
, Issue.6
, pp. 997-1003
-
-
Owens, R.1
Akalu, R.2
-
17
-
-
34748812242
-
The economics of e-cash
-
Feb
-
M. T. Maat, "The economics of e-cash," Spectrum, IEEE, vol. 34, Issue 2, Feb., 1997, pp. 68-73.
-
(1997)
Spectrum, IEEE
, vol.34
, Issue.2
, pp. 68-73
-
-
Maat, M.T.1
-
19
-
-
33750274436
-
Privacy-Preserving Digital Rights Management
-
C. Conrado, M. Petkovic, and W. Jonker, "Privacy-Preserving Digital Rights Management," in the Proceedings of the Secure Data Management, 2004, pp. 83-99.
-
(2004)
Proceedings of the Secure Data Management
, pp. 83-99
-
-
Conrado, C.1
Petkovic, M.2
Jonker, W.3
-
20
-
-
21244502911
-
Special Issue on Enabling Security Technologies for Digital Rights Management
-
Jun
-
D. Kundur, C. Y. Lin, B. Macq, and H. Yu, "Special Issue on Enabling Security Technologies for Digital Rights Management," Proceedings of the IEEE, vol. 92, issue 6, Jun., 2004, pp. 879-882.
-
(2004)
Proceedings of the IEEE
, vol.92
, Issue.6
, pp. 879-882
-
-
Kundur, D.1
Lin, C.Y.2
Macq, B.3
Yu, H.4
-
21
-
-
21244467115
-
The technical and legal dangers of code-based fair use enforcement
-
Jun
-
J. S. Erickson and D. K. Mulligan, "The technical and legal dangers of code-based fair use enforcement," Proceedings of the IEEE, vol. 92, issue 6, Jun., 2004, pp. 985-996.
-
(2004)
Proceedings of the IEEE
, vol.92
, Issue.6
, pp. 985-996
-
-
Erickson, J.S.1
Mulligan, D.K.2
-
22
-
-
85032752203
-
Technological protection measures in the courts
-
March
-
R. Akalu. and D. Kundar, "Technological protection measures in the courts," IEEE Signal Processing Magazine, vol. 21, issue 2, March, 2004, pp. 109-117.
-
(2004)
IEEE Signal Processing Magazine
, vol.21
, Issue.2
, pp. 109-117
-
-
Akalu, R.1
Kundar, D.2
-
23
-
-
0035444729
-
IT architecture meets the real (legal) world
-
Sept
-
J. Williams, "IT architecture meets the real (legal) world," IEEE IT Professional, vol. 3, issue 5, Sept., 2001, pp. 65-68.
-
(2001)
IEEE IT Professional
, vol.3
, Issue.5
, pp. 65-68
-
-
Williams, J.1
-
24
-
-
0032653932
-
A perspective: The role of identifiers in managing and protecting intellectual property in the digital age
-
Jul
-
K. Hill, "A perspective: the role of identifiers in managing and protecting intellectual property in the digital age," Proceedings of the IEEE, vol. 87, issue 7, Jul., 1994, pp. 1228-1238.
-
(1994)
Proceedings of the IEEE
, vol.87
, Issue.7
, pp. 1228-1238
-
-
Hill, K.1
-
25
-
-
3042780599
-
The good, the bad, and the ugly: What might change if we had good DRM
-
May
-
M. Lesk, "The good, the bad, and the ugly: what might change if we had good DRM," IEEE Security & Privacy Magazine, vol. 1, issue 3, May, 2003, pp.63-66.
-
(2003)
IEEE Security & Privacy Magazine
, vol.1
, Issue.3
, pp. 63-66
-
-
Lesk, M.1
|