My Account Log in

1 option

Digital Rights Management : ACM CCS-9 Workshop, DRM 2002, Washington, DC, USA, November 18, 2002, Revised Papers / edited by Joan Feigenbaum.

LIBRA Q341 .P7 2004
Loading location information...

Available from offsite location This item is stored in our repository but can be checked out.

Log in to request item
Format:
Book
Contributor:
Feigenbaum, Joan, 1958- editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
Lecture notes in computer science 0302-9743 ; 2696.
Lecture Notes in Computer Science, 0302-9743 ; 2696
Language:
English
Subjects (All):
Data encryption (Computer science).
Computer networks.
Operating systems (Computers).
Computers and civilization.
Computers.
Law and legislation.
Cryptology.
Computer Communication Networks.
Science, Humanities and Social Sciences, multidisciplinary.
Operating Systems.
Computers and Society.
Legal Aspects of Computing.
Local Subjects:
Cryptology.
Computer Communication Networks.
Science, Humanities and Social Sciences, multidisciplinary.
Operating Systems.
Computers and Society.
Legal Aspects of Computing.
Physical Description:
1 online resource (X, 222 pages).
Edition:
First edition 2003.
Contained In:
Springer eBooks
Place of Publication:
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2003.
System Details:
text file PDF
Summary:
This book constitutes the thoroughly refereed post-proceedings of the Second International Workshop on Digital Rights Management, DRM 2002, held in Washington, DC, USA, in November 2002, in conjunction with ACM CCS-9. The 13 revised full papers presented were carefully reviewed and selected for inclusion in the book. Among the topics addressed are DES implementation for DRM applications, cryptographic attacks, industrial challenges, public key broadcast encryption, fingerprinting, copy-prevention techniques, copyright limitations, content protection, watermarking systems, and theft-protected proprietary certificates.
Contents:
ACM DRM 2002
A White-Box DES Implementation for DRM Applications
Attacking an Obfuscated Cipher by Injecting Faults
Breaking and Repairing Asymmetric Public-Key Traitor Tracing
Key Challenges in DRM: An Industry Perspective
Public Key Broadcast Encryption for Stateless Receivers
Traitor Tracing for Shortened and Corrupted Fingerprints
Evaluating New Copy-Prevention Techniques for Audio CDs
Towards Meeting the Privacy Challenge: Adapting DRM
Implementing Copyright Limitations in Rights Expression Languages
The Darknet and the Future of Content Protection
Replacement Attack on Arbitrary Watermarking Systems
FAIR: Fair Audience InfeRence
Theft-Protected Proprietary Certificates.
Other Format:
Printed edition:
ISBN:
978-3-540-44993-5
9783540449935
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account