{"title":"Scalable DRM System for Media Portability","authors":"Hyoungshick Kim","doi":"10.1007/978-3-540-76929-3_9","DOIUrl":"https://doi.org/10.1007/978-3-540-76929-3_9","url":null,"abstract":"","PeriodicalId":194921,"journal":{"name":"Asian Computing Science Conference","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125431166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Empirical Study of the Impact of Metasploit-Related Attacks in 4 Years of Attack Traces","authors":"E. Ramirez-Silva, M. Dacier","doi":"10.1007/978-3-540-76929-3_19","DOIUrl":"https://doi.org/10.1007/978-3-540-76929-3_19","url":null,"abstract":"","PeriodicalId":194921,"journal":{"name":"Asian Computing Science Conference","volume":"241 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132929222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Static vs Dynamic Typing for Access Control in Pi-Calculus","authors":"M. Bugliesi, Damiano Macedonio, S. Rossi","doi":"10.1007/978-3-540-76929-3_27","DOIUrl":"https://doi.org/10.1007/978-3-540-76929-3_27","url":null,"abstract":"","PeriodicalId":194921,"journal":{"name":"Asian Computing Science Conference","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127631340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Sandbox with a Dynamic Policy Based on Execution Contexts of Applications","authors":"T. Shioya, Y. Oyama, H. Iwasaki","doi":"10.1007/978-3-540-76929-3_28","DOIUrl":"https://doi.org/10.1007/978-3-540-76929-3_28","url":null,"abstract":"","PeriodicalId":194921,"journal":{"name":"Asian Computing Science Conference","volume":"62 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133286994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Digital Rights Management Using a Master Control Device","authors":"I. Abbadi","doi":"10.1007/978-3-540-76929-3_13","DOIUrl":"https://doi.org/10.1007/978-3-540-76929-3_13","url":null,"abstract":"","PeriodicalId":194921,"journal":{"name":"Asian Computing Science Conference","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122578052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Formal Analysis for Capturing Replay Attacks in Cryptographic Protocols","authors":"Han Gao, C. Bodei, P. Degano, H. R. Nielson","doi":"10.1007/978-3-540-76929-3_15","DOIUrl":"https://doi.org/10.1007/978-3-540-76929-3_15","url":null,"abstract":"","PeriodicalId":194921,"journal":{"name":"Asian Computing Science Conference","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116051360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}