ABE-IPSABE HOLDINGABE BOOKS
English Polski
On-line access

Bookstore

0.00 PLN
Bookshelf (0) 
Your bookshelf is empty
Digital Rights Management: Technologies, Issues, Challenges and Systems

Digital Rights Management: Technologies, Issues, Challenges and Systems

Publisher Springer, Berlin
Year
Pages 360
Version paperback
Language English
ISBN 9783540359982
Categories Coding theory & cryptology
Delivery to United States

check shipping prices
Ask about the product
Email
question
  Send
Add to bookshelf

Book description

This book constitutes the thoroughly refereed post-proceedings of the First International Conference on Digital Rights Management: Technology, Issues, Challenges and Systems, DRMTICS 2005, held in Sydney, Australia, in October/November 2005. Presents 26 carefully reviewed full papers organized in topical sections on assurance and authentication issues, legal and related issues, expressing rights and management, watermarking, software issues, fingerprinting and image authentication, supporting cryptographic technology, P2P issues, implementations and architectures.

Digital Rights Management: Technologies, Issues, Challenges and Systems

Table of contents

Assurance and Authentication Issues.- A Novel Framework for Multiple Creatorship Protection of Digital Movies.- TIVA: Trusted Integrity Verification Architecture.- Legal and Related Issues.- The Australian Sony PlayStation Case: How Far Will Anti-circumvention Law Reach in the Name of DRM?.- Downloading vs Purchase: Music Industry vs Consumers.- Digital Rights Management: Merging Contract, Copyright and Criminal Law.- Expressing Rights and Management.- User-Attributed Rights in DRM.- AVS-REL-A New Right Expression Language.- A Comparative Study of Specification Models for Autonomic Access Control of Digital Rights.- Watermarking.- The Effect of Fidelity Measure Functions on the Capacity of Digital Watermarks.- A MPEG-2 Video Watermarking Algorithm with Compensation in Bit Stream.- Reversible Semi-fragile Image Authentication Using Zernike Moments and Integer Wavelet Transform.- Software Issues.- Software Tamper Resistance Through Dynamic Program Monitoring.- Call Tree Transformation for Program Obfuscation and Copy Protection.- Algorithms to Watermark Software Through Register Allocation.- Fingerprinting and Image Authentication.- An Efficient Fingerprinting Scheme with Secret Sharing.- Worst-Case Optimal Fingerprinting Codes for Non-threshold Collusion.- Secure Remote Fingerprint Verification Using Dual Watermarks.- Supporting Cryptographic Technology.- Security Weaknesses of Certain Broadcast Encryption Schemes.- A Broadcast Encryption Scheme with Free-Riders but Unconditional Security.- A Novel Broadcast Encryption Based on Time-Bound Cryptographic Keys.- A Vector Approach to Cryptography Implementation.- P2P Issues.- A Novel Privacy and Copyright Protection Enforced Peer-to-Peer Network.- Design of a Secure Digital Contents Delivery System in P2P Networks.- Implementations and Architectures.- Real-Time Implementation of Broadcast Switching System Using Audio Watermark.- Enforcing Regional DRM for Multimedia Broadcasts With and Without Trusted Computing.- A DRM System Supporting What You See Is What You Pay.

We also recommend books

Strony www Białystok Warszawa
801 777 223