Digital Rights Management

[1]  Timothy A. Budd Protecting and Managing Electronic Content with a Digital Battery , 2001, Computer.

[2]  Amit Sahai,et al.  On the (im)possibility of obfuscating programs , 2001, JACM.

[3]  Miodrag Potkonjak,et al.  Optimization-intensive watermarking techniques for decision problems , 1999, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[4]  Jan Camenisch Efficient Anonymous Fingerprinting with Group Signatures , 2000, ASIACRYPT.

[5]  Ross J. Anderson Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .

[6]  Miodrag Potkonjak,et al.  Watermarking techniques for intellectual property protection , 1998, Proceedings 1998 Design and Automation Conference. 35th DAC. (Cat. No.98CH36175).

[7]  William A. Arbaugh,et al.  A secure and reliable bootstrap architecture , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[8]  Ahmad-Reza Sadeghi,et al.  Coin-Based Anonymous Fingerprinting , 1999, EUROCRYPT.

[9]  Markus Jakobsson,et al.  Discouraging Software Piracy Using Software Aging , 2001, Digital Rights Management Workshop.

[10]  Aparna Gurijala,et al.  Why watermark?: the copyright need for an engineering solution , 2002, JCDL '02.

[11]  Miodrag Potkonjak,et al.  Fingerprinting intellectual property using constraint-addition , 2000, DAC.