{"title":"Software Tamper Resistance Through Dynamic Program Monitoring","authors":"Brian Blietz, A. Tyagi","doi":"10.1007/11787952_12","DOIUrl":"https://doi.org/10.1007/11787952_12","url":null,"abstract":"","PeriodicalId":262919,"journal":{"name":"Digital Rights Management: Technology, Issues, Challenges and Systems","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117157460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Weaknesses of Certain Broadcast Encryption Schemes","authors":"M. Mihaljević, M. Fossorier, H. Imai","doi":"10.1007/11787952_18","DOIUrl":"https://doi.org/10.1007/11787952_18","url":null,"abstract":"","PeriodicalId":262919,"journal":{"name":"Digital Rights Management: Technology, Issues, Challenges and Systems","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121637427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Australian Sony PlayStation Case: How Far Will Anti-circumvention Law Reach in the Name of DRM?","authors":"Brian Fitzgerald","doi":"10.1007/11787952_3","DOIUrl":"https://doi.org/10.1007/11787952_3","url":null,"abstract":"","PeriodicalId":262919,"journal":{"name":"Digital Rights Management: Technology, Issues, Challenges and Systems","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114226034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Call Tree Transformation for Program Obfuscation and Copy Protection","authors":"Valery Pryamikov","doi":"10.1007/11787952_13","DOIUrl":"https://doi.org/10.1007/11787952_13","url":null,"abstract":"","PeriodicalId":262919,"journal":{"name":"Digital Rights Management: Technology, Issues, Challenges and Systems","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122288276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Vector Approach to Cryptography Implementation","authors":"J. Fournier, S. Moore","doi":"10.1007/11787952_21","DOIUrl":"https://doi.org/10.1007/11787952_21","url":null,"abstract":"","PeriodicalId":262919,"journal":{"name":"Digital Rights Management: Technology, Issues, Challenges and Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115201089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Supriya Singh, M. Jackson, Jenny Waycott, J. Beekhuyzen
{"title":"Downloading vs Purchase: Music Industry vs Consumers","authors":"Supriya Singh, M. Jackson, Jenny Waycott, J. Beekhuyzen","doi":"10.1007/11787952_4","DOIUrl":"https://doi.org/10.1007/11787952_4","url":null,"abstract":"","PeriodicalId":262919,"journal":{"name":"Digital Rights Management: Technology, Issues, Challenges and Systems","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124621178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real-Time Implementation of Broadcast Switching System Using Audio Watermark","authors":"Jongweon Kim, Donghwan Shin, Jonguk Choi","doi":"10.1007/11787952_24","DOIUrl":"https://doi.org/10.1007/11787952_24","url":null,"abstract":"","PeriodicalId":262919,"journal":{"name":"Digital Rights Management: Technology, Issues, Challenges and Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130126218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A DRM System Supporting What You See Is What You Pay","authors":"Bin B. Zhu, Yang Yang, Tierui Chen","doi":"10.1007/11787952_26","DOIUrl":"https://doi.org/10.1007/11787952_26","url":null,"abstract":"","PeriodicalId":262919,"journal":{"name":"Digital Rights Management: Technology, Issues, Challenges and Systems","volume":"07 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129754794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Broadcast Encryption Based on Time-Bound Cryptographic Keys","authors":"M. Mihaljević, M. Fossorier, H. Imai","doi":"10.1007/11787952_20","DOIUrl":"https://doi.org/10.1007/11787952_20","url":null,"abstract":"","PeriodicalId":262919,"journal":{"name":"Digital Rights Management: Technology, Issues, Challenges and Systems","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128480670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}