Sciweavers

2354 search results - page 11 / 471
» DRM as a layered system
Sort
View
DRM
2004
Springer
14 years 28 days ago
Attacks and risk analysis for hardware supported software copy protection systems
Recently, there is a growing interest in the research community to use tamper-resistant processors for software copy protection. Many of these tamper-resistant systems rely on a s...
Weidong Shi, Hsien-Hsin S. Lee, Chenghuai Lu, Tao ...
DRM
2008
Springer
13 years 9 months ago
A decision theoretic framework for analyzing binary hash-based content identification systems
Content identification has many applications, ranging from preventing illegal sharing of copyrighted content on video sharing websites, to automatic identification and tagging of ...
Avinash L. Varna, Ashwin Swaminathan, Min Wu
IADIS
2004
13 years 9 months ago
A design of digital rights management system utilizing multimedia content identifiers
All around of people live in the age based on information and knowledge in recent period. It is WWW/Internet technology that provides efficiency and power, which can lead the new ...
Seok-Hoon Kim, Sang-Hoon Oh, Jung-Hoon Hahm
DRM
2003
Springer
14 years 22 days ago
Digital rights management in a 3G mobile phone and beyond
In this paper we examine how copyright protection of digital items can be securely managed in a 3G mobile phone and other devices. First, the basic concepts, strategies, and requi...
Thomas S. Messerges, Ezzat A. Dabbish
GLOBECOM
2010
IEEE
13 years 4 months ago
Quality of Experience Aware Multimedia Provisioning with Cross-Layer Network Management
Abstract--This paper presents a Cross-layer Network Management System (NMS) that allows Service Providers (SPs) to perform cost-effective network resource reservations with their N...
René Serral-Gracià, Eva Marín...