Sciweavers

76 search results - page 6 / 16
» Digital Rights Management, Spyware, and Security
Sort
View
CCS
2001
ACM
13 years 11 months ago
Taking the Copy Out of Copyright
Under current U.S. law and common understanding, the fundamental right granted by copyright is the right of reproduction – of making copies. Indeed, the very word “copyright”...
Ernest Miller, Joan Feigenbaum
DRM
2009
Springer
14 years 1 months ago
An implementation experience of domain management in marlin
Digital Rights Management (DRM) is used to protect copyrighted content from unauthorized use. However, this has taken away the jurisdiction of the consumers over their purchased c...
Sye Loong Keoh, Koen Vrielink
ICMCS
2006
IEEE
119views Multimedia» more  ICMCS 2006»
14 years 23 days ago
Secured MPEG-21 Digital Item Adaptation for H.264 Video
Seamless adaptation and transcoding techniques to adapt the digital content have achieved significant focus to serve the consumers with the desired content in a feasible way. With...
Razib Iqbal, Shervin Shirmohammadi, Abdulmotaleb E...
FAST
2009
13 years 4 months ago
The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance
As increasing amounts of valuable information are produced and persist digitally, the ability to determine the origin of data becomes important. In science, medicine, commerce, an...
Ragib Hasan, Radu Sion, Marianne Winslett
DRM
2008
Springer
13 years 8 months ago
RSA-TBOS signcryption with proxy re-encryption
The recent attack on Apple iTunes Digital Rights Management [17] has brought to light the usefulness of proxy re-encryption schemes for Digital Rights Management. It is known that...
Varad Kirtane, C. Pandu Rangan