-
1
-
-
7444222166
-
Digital rights management for content distribution
-
Darlinghurst, Australia, Australia: Australian Computer Society, Inc., Online. Available
-
Q. Liu, R. S. Naini, and N. P. Sheppard, "Digital rights management for content distribution," in ACSW Frontiers '03: Proceedings of the Australasian information security workshop conference on ACSWfrontiers 2003. Darlinghurst, Australia, Australia: Australian Computer Society, Inc., 2003, pp. 49-58. [Online]. Available: http://portal.acm.org/citation. cfm?id=827987.827994
-
(2003)
ACSW Frontiers '03: Proceedings of the Australasian Information Security Workshop Conference on ACSWfrontiers 2003
, pp. 49-58
-
-
Liu, Q.1
Naini, R.S.2
Sheppard, N.P.3
-
2
-
-
84959058818
-
Privacy engineering for digital rights management systems
-
ser. Lecture Notes in Computer Science, ch. 6, Online. Available
-
J. Feigenbaum, M. Freedman, T. Sander, and A. Shostack, "Privacy engineering for digital rights management systems," in Security and Privacy in Digital Rights Management, ser. Lecture Notes in Computer Science, 2002, ch. 6, pp. 153-163. [Online]. Available: http://dx.doi.org/10.1007/3-540-47870-1-6
-
(2002)
Security and Privacy in Digital Rights Management
, pp. 153-163
-
-
Feigenbaum, J.1
Freedman, M.2
Sander, T.3
Shostack, A.4
-
3
-
-
34848916055
-
A portable DRM scheme using smart cards
-
Online. Available
-
W.-B. Lee, W.-J. Wu, and C.-Y. Chang, "A portable DRM scheme using smart cards," Journal of Organizational Computing and Electronic Commerce, vol. 17, no. 3, pp. 247-258, 2007. [Online]. Available: http://dx.doi.org/10. 1080/10919390701436390
-
(2007)
Journal of Organizational Computing and Electronic Commerce
, vol.17
, Issue.3
, pp. 247-258
-
-
Lee, W.-B.1
Wu, W.-J.2
Chang, C.-Y.3
-
5
-
-
77954489876
-
-
last accessed in Feb
-
OMA, "Open mobile alliance," http://www. openmobilealliance.org last accessed in Feb 2010.
-
(2010)
Open Mobile Alliance
-
-
-
6
-
-
77954508747
-
-
last accessed in Feb
-
Apple, "Apply fairplay DRM," http://www.apple.com/support/ itunes/#authorization; last accessed in Feb 2010.
-
(2010)
Apply Fairplay DRM
-
-
-
7
-
-
77954496214
-
-
USA, last accessed in Feb
-
USA, "First sale doctrine, 17 u.s.c. 109," http://www.law. cornell.edu/uscode/17/109.html last accessed in Feb 2010.
-
(2010)
First Sale Doctrine, 17 U.s.c. 109
-
-
-
10
-
-
33750274436
-
Privacypreserving digital, rights management
-
Online. Available
-
C. Conrado, M. Petković, and W. Jonker, "Privacypreserving digital, rights management," in Secure Data Management, 2004, pp. 83-99. [Online]. Available: http://www.springerlink.com/content/w4x8j2v.knv0yumgn
-
(2004)
Secure Data Management
, pp. 83-99
-
-
Conrado, C.1
Petković, M.2
Jonker, W.3
-
11
-
-
33749054480
-
Enabling DRM-preserving digital content redistribution
-
July Online, Available
-
S. K. Nair, B. C. Popescu, C. Gamage, B. Crispo, and A. S. Tanenbaum, "Enabling DRM-preserving digital content redistribution," in E-Commerce Technology, 2005. CEC 2005. Seventh IEEE International Conference on, July 2005, pp. 151-158. [Online], Available: http://dx.doi.org/10.1109/ICECT. 2005.43
-
(2005)
E-Commerce Technology, 2005. CEC 2005. Seventh IEEE International Conference on
, pp. 151-158
-
-
Nair, S.K.1
Popescu, B.C.2
Gamage, C.3
Crispo, B.4
Tanenbaum, A.S.5
-
12
-
-
38149031556
-
Nuovo DRM paradiso: Towards a verified fair DRM scheme
-
ser. Lecture Notes in Computer Science, ch. 3, Online. Available
-
M. Torabi Dashti, S. Krishnan Nair, and. H. Jonker, "Nuovo DRM paradiso: Towards a verified fair DRM scheme," in International Symposium on Fundamentals of Software Engineering, ser. Lecture Notes in Computer Science, 2007, ch. 3, pp. 33-48. [Online]. Available: http://dx.doi.org/10. 1007/978-3-540-75698-9-3
-
(2007)
International Symposium on Fundamentals of Software Engineering
, pp. 33-48
-
-
Torabi Dashti, M.1
Krishnan Nair, S.2
Jonker, H.3
-
13
-
-
35048878391
-
Concurrent signatures
-
Online, Available
-
L. Chen, C. Kudla, and K. G. Paterson, "Concurrent signatures," in Advances in Cryptology - EUROCRYPT 2004, 2004, pp. 287-305. [Online], Available: http://www. springerlink.com/content/crk98watew580717
-
(2004)
Advances in Cryptology - EUROCRYPT 2004
, pp. 287-305
-
-
Chen, L.1
Kudla, C.2
Paterson, K.G.3
-
14
-
-
84946833891
-
How to leak a secret
-
Online. Available
-
R. Rivest, A. Shamir, and Y. Tauman, "How to leak a secret," in Advances in Cryptology ASIACRYPT 2001, 2001, pp. 552-565. [Online]. Available: http://dx.doi.org/10.1007/3-540-45682-1-32
-
(2001)
Advances in Cryptology ASIACRYPT 2001
, pp. 552-565
-
-
Rivest, R.1
Shamir, A.2
Tauman, Y.3
-
15
-
-
84927752554
-
Designated verifier proofs and their applications
-
ser. Lecture Notes in Computer Science, ch. 13
-
M. Jakobsson, K. Sako, and R. Impagliazzo, "Designated verifier proofs and their applications," in Advances in Cryptology EUROCRYPT '96, ser. Lecture Notes in Computer Science, ch. 13, pp. 143-154.
-
Advances in Cryptology EUROCRYPT '96
, pp. 143-154
-
-
Jakobsson, M.1
Sako, K.2
Impagliazzo, R.3
-
16
-
-
0024889787
-
A new probabilistic algorithm, for clock synchronization
-
December Online. Available
-
K. Arvind, "A new probabilistic algorithm, for clock synchronization," in A new probabilistic algorithm for clock synchronization, December 1989, pp. 330-339. [Online]. Available: http://dx.doi.org/10.1109/REAL.1989.63585
-
(1989)
A New Probabilistic Algorithm for Clock Synchronization
, pp. 330-339
-
-
Arvind, K.1
-
17
-
-
13844322316
-
x, permits
-
January Online, Available
-
x, permits," Power Systems, IEEE Transactions on, vol. 20, no. 1, pp. 119-129, January 2005. [Online], Available: http://dx.doi.org/10.1109/TPWRS.2004.840440
-
(2005)
Power Systems, IEEE Transactions on
, vol.20
, Issue.1
, pp. 119-129
-
-
Chen, Y.1
Hobbs, B.F.2
|