Sciweavers

33 search results - page 5 / 7
» drm 2007
Sort
View
IJCAI
1989
13 years 10 months ago
Motion Planning of Multi-Joint Robotic Arm with Topological Dimension Reduction Method
This paper explores the realization of robotic arm motion planning, especially Findpath Problem, which is a basic motion planning problem that arises in the development of robotic...
Bo Zhang, Ling Zhang, Tian Zhang
SEC
2003
13 years 11 months ago
Secure Audit Logging with Tamper-Resistant Hardware
Secure perimeter schemes (e.g. DRM) and tracing traitor schemes (e.g. watermarking, audit logging) strive to mitigate the problems of content escaping the control of the rights ho...
Cheun Ngen Chong, Zhonghong Peng, Pieter H. Hartel
SAINT
2007
IEEE
14 years 3 months ago
Privacy Management for Context Transponders
While by now feasible solutions to protect privacy for complex ubiquitous applications are available, very small devices, called context transponders (CTP) still lack resources to...
Michael Fahrmair, Wassiou Sitou, Bernd Spanfelner
SACRYPT
2007
Springer
167views Cryptology» more  SACRYPT 2007»
14 years 3 months ago
Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings
Abstract. At DRM 2002, Chow et al. [4] presented a method for implementing the DES block cipher such that it becomes hard to extract the embedded secret key in a white-box attack c...
Brecht Wyseur, Wil Michiels, Paul Gorissen, Bart P...
IJMSO
2007
102views more  IJMSO 2007»
13 years 9 months ago
Referent tracking for Digital Rights Management
: Digital Rights Management (DRM) covers the description, identification, trading, protection, monitoring and tracking of all forms of rights over both tangible and intangible asse...
Werner Ceusters, Barry Smith