Digital Rights Management
暂无分享,去创建一个
Mikhail J. Atallah | Pooja Bhatia | Keith B. Frikken | Carrie Black | Susan Overstreet | M. Atallah | Carrie Black | S. Overstreet | Pooja Bhatia
[1] Timothy A. Budd. Protecting and Managing Electronic Content with a Digital Battery , 2001, Computer.
[2] Amit Sahai,et al. On the (im)possibility of obfuscating programs , 2001, JACM.
[3] Miodrag Potkonjak,et al. Optimization-intensive watermarking techniques for decision problems , 1999, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[4] Jan Camenisch. Efficient Anonymous Fingerprinting with Group Signatures , 2000, ASIACRYPT.
[5] Ross J. Anderson. Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .
[6] Miodrag Potkonjak,et al. Watermarking techniques for intellectual property protection , 1998, Proceedings 1998 Design and Automation Conference. 35th DAC. (Cat. No.98CH36175).
[7] William A. Arbaugh,et al. A secure and reliable bootstrap architecture , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[8] Ahmad-Reza Sadeghi,et al. Coin-Based Anonymous Fingerprinting , 1999, EUROCRYPT.
[9] Markus Jakobsson,et al. Discouraging Software Piracy Using Software Aging , 2001, Digital Rights Management Workshop.
[10] Aparna Gurijala,et al. Why watermark?: the copyright need for an engineering solution , 2002, JCDL '02.
[11] Miodrag Potkonjak,et al. Fingerprinting intellectual property using constraint-addition , 2000, DAC.