Digital Rights Management
Springer Berlin (Verlag)
978-3-540-35998-2 (ISBN)
Assurance and Authentication Issues.- A Novel Framework for Multiple Creatorship Protection of Digital Movies.- TIVA: Trusted Integrity Verification Architecture.- Legal and Related Issues.- The Australian Sony PlayStation Case: How Far Will Anti-circumvention Law Reach in the Name of DRM?.- Downloading vs Purchase: Music Industry vs Consumers.- Digital Rights Management: Merging Contract, Copyright and Criminal Law.- Expressing Rights and Management.- User-Attributed Rights in DRM.- AVS-REL-A New Right Expression Language.- A Comparative Study of Specification Models for Autonomic Access Control of Digital Rights.- Watermarking.- The Effect of Fidelity Measure Functions on the Capacity of Digital Watermarks.- A MPEG-2 Video Watermarking Algorithm with Compensation in Bit Stream.- Reversible Semi-fragile Image Authentication Using Zernike Moments and Integer Wavelet Transform.- Software Issues.- Software Tamper Resistance Through Dynamic Program Monitoring.- Call Tree Transformation for Program Obfuscation and Copy Protection.- Algorithms to Watermark Software Through Register Allocation.- Fingerprinting and Image Authentication.- An Efficient Fingerprinting Scheme with Secret Sharing.- Worst-Case Optimal Fingerprinting Codes for Non-threshold Collusion.- Secure Remote Fingerprint Verification Using Dual Watermarks.- Supporting Cryptographic Technology.- Security Weaknesses of Certain Broadcast Encryption Schemes.- A Broadcast Encryption Scheme with Free-Riders but Unconditional Security.- A Novel Broadcast Encryption Based on Time-Bound Cryptographic Keys.- A Vector Approach to Cryptography Implementation.- P2P Issues.- A Novel Privacy and Copyright Protection Enforced Peer-to-Peer Network.- Design of a Secure Digital Contents Delivery System in P2P Networks.-Implementations and Architectures.- Real-Time Implementation of Broadcast Switching System Using Audio Watermark.- Enforcing Regional DRM for Multimedia Broadcasts With and Without Trusted Computing.- A DRM System Supporting What You See Is What You Pay.
Erscheint lt. Verlag | 30.6.2006 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XII, 360 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 233 mm |
Gewicht | 526 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Assurance • authentication • broadcast encryption • cryptographic protocols • Data Integrity • Digital Payment • Digital rights management • digital signature schemes • Fingerprinting • image authentication • Information Hiding • Information Security • integrity veri • integrity verification • Network Security • Peer-to-Peer Network • privacy • Secure Communications • Watermarking |
ISBN-10 | 3-540-35998-2 / 3540359982 |
ISBN-13 | 978-3-540-35998-2 / 9783540359982 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich