131
Voted
CCS
15 years 6 months ago
2001 ACM
Abstract. Protection of software code against illegitimate modifications by its users is a pressing issue to many software developers. Many software-based mechanisms for protectin...
113
Voted
CCS
15 years 6 months ago
2001 ACM
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
108
Voted
CCS
15 years 6 months ago
2001 ACM
Abstract. We describe a weakness in the High Bandwidth Digital Content Protection (HDCP) scheme which may lead to practical attacks. HDCP is a proposed identity-based cryptosystem ...
95
Voted
CCS
15 years 6 months ago
2001 ACM 117
Voted
CCS
15 years 6 months ago
2001 ACM
This paper will examine and categorize potential business model scenarios for online music. The virtualization of music leads to market uncertainties. On the supply side, the offer...
|