|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 254 occurrences of 151 keywords
|
|
|
Results
Found 669 publication records. Showing 669 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
248 | Diane Lending, Sandra Slaughter |
Research in progress: the effects of ethical climate on attitudes and behaviors toward software piracy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCPR ![In: Proceedings of the ACM SIGCPR Conference on Computer Personnel Research, San Diego, California, USA, 2001, pp. 198-200, 2001, ACM, 1-58113-363-4. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
computer education and training, management of information systems, software ethics, computer crime, software piracy |
116 | Vaddadi P. Chandu, Karandeep Singh, Ravi Baskaran |
A Model for Prevention of Software Piracy through Secure Distribution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCSS (1) ![In: Advances in Computer and Information Sciences and Engineering, Proceedings of the 2007 International Conference on Systems, Computing Sciences and Software Engineering (SCSS), part of the International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE 2007), Bridgeport, CT, USA, December 3-12, 2007, pp. 251-255, 2007, Springer, 978-1-4020-8740-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
98 | Meng-Hsiang Hsu, Tung-Ching Lin, Feng-Yang Kuo, Pei-Cheng Sun |
An Intention Model-based Study of Software Piracy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 32nd Annual Hawaii International Conference on System Sciences (HICSS-32), January 5-8, 1999, Maui, Hawaii, USA, 1999, IEEE Computer Society, 0-7695-0001-3. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
IT ethics, Piracy, Intention model |
91 | Ranjan B. Kini |
Software Piracy in Chilean e-Society. ![Search on Bibsonomy](Pics/bibsonomy.png) |
II3E ![In: Towards Sustainable Society on Ubiquitous Networks, The 8th IFIP Conference on e-Business, e-Services, and e-Society (I3E 2008), September 24-26, 2008, Tokyo, Japan, pp. 289-301, 2008, Springer, 978-0-387-85690-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
86 | Timothy C. H. Kwong, Matthew K. O. Lee |
Behavioral Intention Model for the Exchange Mode Internet Music Piracy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 35th Hawaii International Conference on System Sciences (HICSS-35 2002), CD-ROM / Abstracts Proceedings, 7-10 January 2002, Big Island, HI, USA, pp. 191, 2002, IEEE Computer Society, 0-7695-1435-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Internet Music Piracy, Peer-to-Peer Electronic Commerce, MP3, Exchange |
79 | Ramnath K. Chellappa, Shivendu Shivendu |
Economics of Technology Standards: Implications for Offline Movie Piracy in a Global Context. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 36th Hawaii International Conference on System Sciences (HICSS-36 2003), CD-ROM / Abstracts Proceedings, January 6-9, 2003, Big Island, HI, USA, pp. 199, 2003, IEEE Computer Society, 0-7695-1874-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
69 | Sudip Bhattacharjee, Ram D. Gopal, Kaveepan Lertwachara, James R. Marsden |
Economic of online music. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Proceedings of the 5th International Conference on Electronic Commerce, ICEC 2003, Pittsburgh, Pennsylvania, USA, September 30 - October 03, 2003, pp. 300-309, 2003, ACM, 1-58113-788-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
digital goods, experience goods, retail channels, emerging technologies, piracy, online consumer behavior |
57 | Marc Fetscherin, Matthias Schmid |
Comparing the usage of digital rights management systems in the music, film, and print industry. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Proceedings of the 5th International Conference on Electronic Commerce, ICEC 2003, Pittsburgh, Pennsylvania, USA, September 30 - October 03, 2003, pp. 316-325, 2003, ACM, 1-58113-788-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
digital content distribution, protection technologies, digital rights management, digital content, piracy |
54 | Jarrod A. Roy, Farinaz Koushanfar, Igor L. Markov |
EPIC: Ending Piracy of Integrated Circuits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DATE ![In: Design, Automation and Test in Europe, DATE 2008, Munich, Germany, March 10-14, 2008, pp. 1069-1074, 2008, ACM, 978-3-9810801-3-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
54 | Samir N. Hamade |
The Legal and Political Aspects of Software Piracy in the Arab World. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Third International Conference on Information Technology: New Generations (ITNG 2006), 10-12 April 2006, Las Vegas, Nevada, USA, pp. 137-142, 2006, IEEE Computer Society, 0-7695-2497-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
54 | Sudip Bhattacharjee, Ram D. Gopal, Kaveepan Lertwachara, James R. Marsden |
No More Shadow Boxing with Online Music Piracy: Strategic Business Models to Enhance Revenues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 36th Hawaii International Conference on System Sciences (HICSS-36 2003), CD-ROM / Abstracts Proceedings, January 6-9, 2003, Big Island, HI, USA, pp. 200, 2003, IEEE Computer Society, 0-7695-1874-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
50 | Amos Fiat, Tamir Tassa |
Dynamic Traitor Training. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings, pp. 354-371, 1999, Springer, 3-540-66347-9. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
49 | Yuping Hu |
A Watermarking Protocol for Piracy Tracing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISECS ![In: Proceedings of The International Symposium on Electronic Commerce and Security, ISECS 2008, August 3-5, 2008, Guangzhou, China, pp. 882-885, 2008, IEEE Computer Society, 978-0-7695-3258-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
piracy tracing, watermarking protocol, anonymity |
49 | Bertrand Anckaert, Bjorn De Sutter, Koen De Bosschere |
Software piracy prevention through diversity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Rights Management Workshop ![In: Proceedings of the 2004 ACM Workshop on Digital Rights Management 2004, Washington, DC, USA, October 25, 2004, pp. 63-71, 2004, ACM, 1-58113-969-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
software piracy prevention, tailored updates, authentication, diversity, identification, copyright protection, intellectual property protection |
44 | Ginger Myles, Christian S. Collberg |
Software watermarking via opaque predicates: Implementation, analysis, and attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Electron. Commer. Res. ![In: Electron. Commer. Res. 6(2), pp. 155-171, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Opaque predicate, Copyright protection, Software piracy, Software watermarking |
44 | Ramnath K. Chellappa, Shivendu Shivendu |
Pay now or pay later?: managing digital product supply chains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Proceedings of the 5th International Conference on Electronic Commerce, ICEC 2003, Pittsburgh, Pennsylvania, USA, September 30 - October 03, 2003, pp. 230-234, 2003, ACM, 1-58113-788-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Stackelberg, digital products, entertainment industries, software, supply chain, pricing, piracy |
42 | Robert Willison, Mikko T. Siponen |
Software Piracy: Original Insights from a Criminological Perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), Proceedings, 7-10 January 2008, Waikoloa, Big Island, HI, USA, pp. 266, 2008, IEEE Computer Society, 0-7695-3075-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
42 | Petar Djekic, Claudia Löbbecke |
Software Piracy Prevention through Digital Rights Management Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CEC ![In: 7th IEEE International Conference on E-Commerce Technology (CEC 2005), 19-22 July 2005, München, Germany, pp. 504-507, 2005, IEEE Computer Society, 0-7695-2277-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
42 | Timothy C. H. Kwong, Matthew K. O. Lee |
Understanding the Behavioral Intention to Digital Piracy in Virtual Communities - A Propose Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EEE ![In: 2004 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 04), 29-31 March 2004, Taipei, Taiwan, pp. 223-226, 2004, IEEE Computer Society, 0-7695-2073-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
42 | Stuart Haber, Bill G. Horne, Joe Pato, Tomas Sander, Robert Endre Tarjan |
If Piracy Is the Problem, Is DRM the Answer? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Rights Management ![In: Digital Rights Management - Technological, Economic, Legal and Political Aspects, pp. 224-233, 2003, Springer, 3-540-40465-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
42 | Markus Jakobsson, Michael K. Reiter |
Discouraging Software Piracy Using Software Aging. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Rights Management Workshop ![In: Security and Privacy in Digital Rights Management, ACM CCS-8 Workshop DRM 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers, pp. 1-12, 2001, Springer, 3-540-43677-4. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
39 | Linda Dailey Paulson |
Technique Makes Strong Encryption Easier to Use. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 42(4), pp. 24-27, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
chip piracy, Ending Piracy of Integrated Circuits, high-definition displays, dual modulation, local dimming, Livescribe Pulse, public-key cryptography, identity-based encryption, high-dynamic range, LEDs |
37 | Américo Nobre G. F. Amorim, Jairo S. Dornelas |
P2P Users: Important dimensions for changing to legal online music stores. ![Search on Bibsonomy](Pics/bibsonomy.png) |
I3E ![In: Project E-Society: Building Bricks, 6TH IFIP International Conference on e-Commerce, e-Business, and e-Government (I3E 2006), October 11-13, 2006, Turku, Finland, pp. 228-239, 2006, Springer, 978-0-387-39226-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
37 | Mikko Välimäki, Ville Oksanen, Juha Laine |
An empirical look at the problems of open source adoption in Finnish municipalities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Proceedings of the 7th International Conference on Electronic Commerce, ICEC 2005, Xi'an, China, August 15-17, 2005, pp. 514-520, 2005, ACM, 1-59593-112-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
open source software, developing countries, public policy, Finland |
37 | Seiichi Gohshi, Haruyuki Nakamura, Hiroshi Ito 0003, Ryousuke Fujii, Mitsuyoshi Suzuki, Shigenori Takai, Yukari Tani |
A New Watermark Surviving After Re-shooting the Images Displayed on a Screen. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (2) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part II, pp. 1099-1107, 2005, Springer, 3-540-28895-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Hongxia Jin, Jeffery Lotspiech |
Attacks and Forensic Analysis for Multimedia Content Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICME ![In: Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, ICME 2005, July 6-9, 2005, Amsterdam, The Netherlands, pp. 1392-1395, 2005, IEEE Computer Society, 0-7803-9331-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Greg Goth, Pam Frost Gorder, Scott L. Andresen |
News. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 2(1), pp. 14-19, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
37 | Aggelos Kiayias, Moti Yung |
On Crafty Pirates and Foxy Tracers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Rights Management Workshop ![In: Security and Privacy in Digital Rights Management, ACM CCS-8 Workshop DRM 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers, pp. 22-39, 2001, Springer, 3-540-43677-4. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
36 | Alex Baumgarten, Akhilesh Tyagi, Joseph Zambreno |
Preventing IC Piracy Using Reconfigurable Logic Barriers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Des. Test Comput. ![In: IEEE Des. Test Comput. 27(1), pp. 66-75, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
hardware metering, IC fabrication, IC piracy, IC security, reconfigurable-logic barriers, selection heuristics, design and test |
36 | Min-Jeong Lee, Kyung-Su Kim 0001, Heung-Kyu Lee |
Forensic Tracking Watermarking against In-theater Piracy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 11th International Workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papers, pp. 117-131, 2009, Springer, 978-3-642-04430-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
forensic tracking watermarking, in-theater piracy, local auto-correlation function (LACF) |
36 | Luis E. Cuéllar |
Open source license alternatives for software applications: is it a solution to stop software piracy? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference (2) ![In: Proceedings of the 43nd Annual Southeast Regional Conference, 2005, Kennesaw, Georgia, Alabama, USA, March 18-20, 2005, Volume 2, pp. 269-274, 2005, ACM. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
copyleft, open source, intellectual property, copyright, license, free software, software piracy |
34 | Dongyeon Kim, Kyuhong Park, Youngsok Bang |
The effect of TV drama piracy: An analysis of digital piracy users, internet buzz, and TV drama viewership. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Manag. ![In: Inf. Manag. 59(2), pp. 103599, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
34 | Kar Yan Tam, Katherine Yue Feng, Samuel Shu Kin Kwan |
The Role of Morality in Digital Piracy: Understanding the Deterrent and Motivational Effects of Moral Reasoning in Different Piracy Contexts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Assoc. Inf. Syst. ![In: J. Assoc. Inf. Syst. 20(5), pp. 3, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
34 | Jooyeon Park, Changsoo Sung |
The Effect of Online Piracy Deterrence on Self-Control and Piracy Intention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PACIS ![In: 19th Pacific Asia Conference on Information Systems, PACIS 2015, Singapore, July 5-9, 2015, pp. 21, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
34 | Paul Alexander Aitken |
The ambivalences of piracy : BitTorrent media piracy and anti-capitalism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2012 |
RDF |
|
34 | Ram D. Gopal, Alok Gupta |
Trading Higher Software Piracy for Higher Profits: The Case of Phantom Piracy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Manag. Sci. ![In: Manag. Sci. 56(11), pp. 1946-1962, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
34 | Jeevan Jaisingh |
Impact of piracy on innovation at software firms and implications for piracy policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Decis. Support Syst. ![In: Decis. Support Syst. 46(4), pp. 763-773, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
34 | Jeevan Jaisingh |
Impact of Piracy on Innovation at Software Firms and Implications for Piracy Policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PACIS ![In: Pacific Asia Conference on Information Systems, PACIS 2007, Auckland, New Zealand, July 4-6, 2007, pp. 52, 2007, AISeL. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
34 | Thomas H. Apperley |
Piracy in the Caribbean: The Political Stakes of Videogame Piracy in Chávez's Venezuela. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DiGRA Conference ![In: Proceedings of the 2007 DiGRA International Conference: Situated Play, DiGRA 2007, Tokyo, Japan, September 24-28, 2007, 2007, Digital Games Research Association. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
34 | Petar Djekic, Claudia Löbbecke |
The Impact of Technical Copy Protection and Internet Services Usage on Software Piracy - An International Survey on Sequencer Software Piracy -. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECIS ![In: Proceedings of the 13th European Conference on Information Systems, Information Systems in a Rapidly Changing Economy, ECIS 2005, Regensburg, Germany, May 26-28, 2005, pp. 712-723, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
32 | Allyn D. Stott, Aakash Taneja |
An Evaluation of Multiple Perceptions of Digital Rights Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AMCIS/SIGeBIZ ![In: Value Creation in E-Business Management. 15th Americas Conference on Information Systems, AMCIS 2009, SIGeBIZ track, San Francisco, CA, USA, August 6-9, 2009. Selected Papers, pp. 80-88, 2009, Springer, 978-3-642-03131-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
online music business, electronic commerce, digital rights management, DRM, Copyright, piracy, fair use |
32 | James R. Marsden |
The Internet and DSS: massive, real-time data availability is changing the DSS landscape. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. E Bus. Manag. ![In: Inf. Syst. E Bus. Manag. 6(2), pp. 193-203, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Real-time data, E-retailing, Decision support systems, Intellectual property, Online auctions, Piracy |
32 | Rajat Subhra Chakraborty, Swarup Bhunia |
Hardware protection and authentication through netlist level obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCAD ![In: 2008 International Conference on Computer-Aided Design, ICCAD 2008, San Jose, CA, USA, November 10-13, 2008, pp. 674-677, 2008, IEEE Computer Society, 978-1-4244-2820-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
IP piracy, design for security, hardware authentication, hardware obfuscation, hardware protection |
32 | Hongxia Jin, Jeffery Lotspiech |
Renewable Traitor Tracing: A Trace-Revoke-Trace System For Anonymous Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings, pp. 563-577, 2007, Springer, 978-3-540-74834-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
anti-piracy, broadcast encryption, traitor tracing, Content protection |
32 | Martin R. Stytz |
Protecting Personal Privacy: Hauling Down the Jolly Roger. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 3(4), pp. 72-74, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
personal private information, Internet piracy |
32 | Xiangyu Zhang 0001, Rajiv Gupta 0001 |
Matching execution histories of program versions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESEC/SIGSOFT FSE ![In: Proceedings of the 10th European Software Engineering Conference held jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2005, Lisbon, Portugal, September 5-9, 2005, pp. 197-206, 2005, ACM, 1-59593-014-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
piracy detection, debugging, dynamic analysis, execution traces |
32 | Yimei Guo |
A comment on chinese legal environment of online copyright protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Proceedings of the 7th International Conference on Electronic Commerce, ICEC 2005, Xi'an, China, August 15-17, 2005, pp. 874-879, 2005, ACM, 1-59593-112-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Chinese legal environment of online copyright protection, internet piracy, corporation |
32 | Olivier Billet, Henri Gilbert, Charaf Ech-Chatbi |
Cryptanalysis of a White Box AES Implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 11th International Workshop, SAC 2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers, pp. 227-240, 2004, Springer, 3-540-24327-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
white box, implementation, block ciphers, AES, tamper resistance, software piracy |
32 | Christian S. Collberg, Edward Carter, Saumya K. Debray, Andrew Huntwork, John D. Kececioglu, Cullen Linn, Michael Stepp |
Dynamic path-based software watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLDI ![In: Proceedings of the ACM SIGPLAN 2004 Conference on Programming Language Design and Implementation 2004, Washington, DC, USA, June 9-11, 2004, pp. 107-118, 2004, ACM, 1-58113-807-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
watermarking, software protection, software piracy |
32 | Ginger Myles, Christian S. Collberg |
Detecting Software Theft via Whole Program Path Birthmarks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings, pp. 404-415, 2004, Springer, 3-540-23208-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
copyright protection, software piracy, software birthmark |
32 | Ginger Myles, Christian S. Collberg |
Software Watermarking Through Register Allocation: Implementation, Analysis, and Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers, pp. 274-293, 2003, Springer, 3-540-21376-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Copyright protection, register allocation, Java bytecode, software piracy, software watermarking |
32 | Gaël Hachez, Laurent Den Hollander, Mehrdad Jalali, Jean-Jacques Quisquater, Christophe Vasserot |
Towards a Practical Secure Framework for Mobile Code Commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Third International Workshop, ISW 2000, Wollongong, NSW, Australia, December 20-21, 2000, Proceedings, pp. 164-178, 2000, Springer, 3-540-41416-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
electronic right management, electronic commerce, watermarking, copyright protection, obfuscation, software piracy |
29 | Yousra Alkabani, Farinaz Koushanfar, Miodrag Potkonjak |
Remote activation of ICs for piracy prevention and digital right management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCAD ![In: 2007 International Conference on Computer-Aided Design, ICCAD 2007, San Jose, CA, USA, November 5-8, 2007, pp. 674-677, 2007, IEEE Computer Society, 1-4244-1382-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Kallol Kumar Bagchi, Peeter Kirs, Robert Cerveny |
Global software piracy: can economic factors alone explain the trend? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 49(6), pp. 70-76, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Ori Dvir, Maurice Herlihy, Nir Shavit |
Virtual Leashing: Internet-Based Software Piracy Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: 25th International Conference on Distributed Computing Systems (ICDCS 2005), 6-10 June 2005, Columbus, OH, USA, pp. 283-292, 2005, IEEE Computer Society, 0-7695-2331-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Seungkyoon Shin, Ram D. Gopal, G. Lawrence Sanders, Andrew B. Whinston |
Global software piracy revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 47(1), pp. 103-107, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Yoichiro Itakura, Makoto Yokozawa, Takeshi Shinohara |
Model Analysis of Digital Copyright Piracy on P2P Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT Workshops ![In: 2004 Symposium on Applications and the Internet Workshops (SAINT 2004 Workshops), 26-30 January 2004, Tokyo, Japan, pp. 84-89, 2004, IEEE Computer Society, 0-7695-2050-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Savitha Srinivasan |
Guest Editor's Introduction: On Piracy and Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 36(7), pp. 36-38, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
29 | Jun Yang 0002, Youtao Zhang, Lan Gao |
Fast Secure Processor for Inhibiting Software Piracy and Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MICRO ![In: Proceedings of the 36th Annual International Symposium on Microarchitecture, San Diego, CA, USA, December 3-5, 2003, pp. 351-360, 2003, IEEE Computer Society, 0-7695-2043-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
29 | Hyun-Jeong Kim, Dong Hoon Lee 0001, Moti Yung |
Privacy against Piracy: Protecting Two-Level Revocable P-K Traitor Tracing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 7th Australian Conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002, Proceedings, pp. 482-496, 2002, Springer, 3-540-43861-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
25 | Hongxia Jin, Serdar Pehlivanoglu |
Traitor Tracing without A Priori Bound on the Coalition Size. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 234-241, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Maura B. Paterson |
Sequential and dynamic frameproof codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 42(3), pp. 317-326, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
05B30, AMS Classifications 94A62 |
25 | Ireneusz J. Jozwiak, Krzysztof Marczak |
A Hardware-Based Software Protection Systems - Analysis of Security Dongles with Time Meters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DepCoS-RELCOMEX ![In: 2007 International Conference on Dependability of Computer Systems (DepCoS-RELCOMEX 2007), June 14-16, 2007, Szklarska Poreba, Poland, pp. 254-261, 2007, IEEE Computer Society, 0-7695-2850-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Giancarlo Ruffo |
Peer-to-Peer Market Places: Technical Issues and Revenue Models. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIMS ![In: Inter-Domain Management, First International Conference on Autonomous Infrastructure, Management and Security, AIMS 2007, Oslo, Norway, June 21-22, 2007, Proceedings, pp. 236, 2007, Springer, 978-3-540-72985-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Harald Schmidbauer, Mehmet Gençer, Vehbi Sinan Tunalioglu |
Free/Open Source Software Adoption, Public Policies and Development Indicators: An International Comparison. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
OSS ![In: Open Source Development, Adoption and Innovation, IFIP Working Group 2.13 on Open Source Software, June 11-14, 2007, Limerick, Ireland, pp. 331-336, 2007, Springer, 978-0-387-72485-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Vijayanand Nagarajan, Rajiv Gupta 0001, Matias Madou, Xiangyu Zhang 0001, Bjorn De Sutter |
Matching Control Flow of Program Versions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSM ![In: 23rd IEEE International Conference on Software Maintenance (ICSM 2007), October 2-5, 2007, Paris, France, pp. 84-93, 2007, IEEE Computer Society, 978-1-4244-1256-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Jong Hwan Suh, Jae-Hoon Jin, Sung-Je Park, Soon-Young Bae, Sang-Chan Park |
U-DRM: A Framework of Digital Rights Management Based on Ubiquitous Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAT Workshops ![In: 16th International Conference on Artificial Reality and Telexistence, ICAT 2006, Hangzhou, China, November 29 - December 1, 2006, Workshops Proceedings, pp. 570-575, 2006, IEEE Computer Society, 0-7695-2754-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Ru Zhang, Xiao-gang Yu, Linna Zhou, Hong-peng Li |
A New Watermarking Protocol of Copyright Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), Pasadena, California, USA, December 18-20, 2006, Proceedings, pp. 83-88, 2006, IEEE Computer Society, 0-7695-2745-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | William Zhu 0001, Clark D. Thomborson, Fei-Yue Wang 0001 |
A Survey of Software Watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005, Proceedings, pp. 454-458, 2005, Springer, 3-540-25999-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Software Security, Software Watermarking |
25 | Xixiang Lv, Bo Yang, Changxing Pei |
Efficient Traitor Tracing Scheme Based On NTRU. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDCAT ![In: Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2005), 5-8 December 2005, Dalian, China, pp. 120-124, 2005, IEEE Computer Society, 0-7695-2405-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Information Security, Copyright Protection, Broadcast Encryption, Traitor Tracing |
25 | Newton Lee |
A word from the editor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Entertain. ![In: Comput. Entertain. 2(2), pp. 2, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Sai Ho Kwok |
File sharing activities over BT Networks: pirated movies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Entertain. ![In: Comput. Entertain. 2(2), pp. 11, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
pirated movies, peer-to-peer, intellectual property, BitTorrent, digital entertainment |
25 | Marcus Peinado, Fabien A. P. Petitcolas, Darko Kirovski |
Digital rights management for digital cinema. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Syst. ![In: Multim. Syst. 9(3), pp. 228-238, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
25 | Hongxia Jin, Jeffery Lotspiech |
Forensic Analysis for Tamper Resistant Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSRE ![In: 14th International Symposium on Software Reliability Engineering (ISSRE 2003), 17-20 November 2003, Denver, CO, USA, pp. 133-142, 2003, IEEE Computer Society, 0-7695-2007-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
25 | Hongxia Jin, Jeffery Lotspiech |
Proactive Software Tampering Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings, pp. 352-365, 2003, Springer, 3-540-20176-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
25 | Aggelos Kiayias, Moti Yung |
Breaking and Repairing Asymmetric Public-Key Traitor Tracing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Rights Management Workshop ![In: Security and Privacy in Digital Rights Management, ACM CCS-9 Workshop, DRM 2002, Washington, DC, USA, November 18, 2002, Revised Papers, pp. 32-50, 2002, Springer, 3-540-40410-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
25 | K. Gopalakrishnan 0001, Nasir D. Memon, Poorvi L. Vora |
Protocols for Watermark Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Multim. ![In: IEEE Multim. 8(4), pp. 66-70, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
25 | David W. Kravitz |
Aspects of Digital Rights Management and the Use of Hardware Security Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, 5th International Conference, FC 2001, Grand Cayman, British West Indies, February 19-22, 2002, Proceedings, pp. 45-49, 2001, Springer, 3-540-44079-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP BibTeX RDF |
|
25 | Tom Kean |
Secure Configuration of Field Programmable Gate Arrays. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPL ![In: Field-Programmable Logic and Applications, 11th International Conference, FPL 2001, Belfast, Northern Ireland, UK, August 27-29, 2001, Proceedings, pp. 142-151, 2001, Springer, 3-540-42499-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
25 | Yacov Yacobi |
A Few Thoughts on E-Commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001, Proceedings, pp. 1-2, 2001, Springer, 3-540-42300-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
25 | Jack Lacy, Schuyler R. Quackenbush, Amy R. Reibman, James H. Snyder |
Intellectual Property Protection Systems and Digital Watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, Second International Workshop, Portland, Oregon, USA, April 14-17, 1998, Proceedings, pp. 158-168, 1998, Springer, 3-540-65386-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
20 | Vijay Laxmi, Mudassar N. Khan, Sarath S. Kumar, Manoj Singh Gaur |
Buyer seller watermarking protocol for digital rights management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 298-301, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
buyer-seller protocol, unbinding., watermark, digital rights management, certificate authority, piracy |
20 | Xiaobo Yin, Hong Liu |
Game Analysis of Copyright Protection of Software Products under Network Condition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESIAT (2) ![In: 2009 International Conference on Environmental Science and Information Application Technology, ESIAT 2009, Wuhan, China, 4-5 July 2009, 3 Volumes, pp. 650-653, 2009, IEEE Computer Society, 978-0-7695-3682-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
appended value, software, cost, copyright, piracy, network externality |
20 | Hakun Lee, Keiichi Kaneko |
Two New Algorithms for Software Watermarking by Register Allocation and their Empirical Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Sixth International Conference on Information Technology: New Generations, ITNG 2009, Las Vegas, Nevada, USA, 27-29 April 2009, pp. 217-222, 2009, IEEE Computer Society, 978-0-7695-3596-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
static watermarking, graph coloring, software protection, software piracy, interference graph |
20 | Changjiang Zhang, Jianmin Wang 0001, Clark D. Thomborson, Chaokun Wang, Christian S. Collberg |
A semi-dynamic multiple watermarking schemefor java applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Rights Management Workshop ![In: Proceedings of the 9th ACM Workshop on Digital Rights Management, Chicago, Illinois, USA, November 9, 2009, pp. 59-72, 2009, ACM, 978-1-60558-779-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
semi-dynamic, software security, software protection, software piracy, software watermarking, multiple watermarking |
20 | David Alan Grier |
Long John Software and the Digital Jolly Roger. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 41(3), pp. 7-9, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
computing profession, computers and society, software piracy |
20 | Yacov Yacobi, Gideon Yaniv |
Counterfeiting and anti-counterfeitingof software and content. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Rights Management Workshop ![In: Proceedings of the 8th ACM Workshop on Digital Rights Management, Alexandria, VA, USA, October 27, 2008, pp. 53-58, 2008, ACM, 978-1-60558-290-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
anti-counterfeiting, monitoring rate, probability of detection, software, counterfeiting, piracy |
20 | Richard H. Stern |
West Coast Federal Appeals Court Upholds Chip Protection Act Violation Finding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Micro ![In: IEEE Micro 27(1), pp. 124-126, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
antitrust violation, Semiconductor Chip Protection Act, chip piracy, monopoly, Altera, Clear Logic, reverse engineering, ASICs, law, bitstream |
20 | Christian S. Collberg, Clark D. Thomborson, Gregg M. Townsend |
Dynamic graph-based software fingerprinting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Program. Lang. Syst. ![In: ACM Trans. Program. Lang. Syst. 29(6), pp. 35, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
watermarking, software protection, Software piracy |
20 | Seokwoo Choi, Heewan Park, Hyun-il Lim, Taisook Han |
A Static Birthmark of Binary Executables Based on API Call Structure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIAN ![In: Advances in Computer Science - ASIAN 2007. Computer and Network Security, 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007, Proceedings, pp. 2-16, 2007, Springer, 978-3-540-76927-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
software piracy, binary analysis, software birthmark |
20 | Dulce B. Ponceleon, Julian A. Cerruti |
Multimedia content protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia ![In: Proceedings of the 14th ACM International Conference on Multimedia, Santa Barbara, CA, USA, October 23-27, 2006, pp. 12, 2006, ACM, 1-59593-447-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
AACS, CPRM, watermarking, encryption, tracing, revocation, broadcast encryption, content protection, piracy |
20 | Yuqun Chen, Mehmet Kivanç Mihçak, Darko Kirovski |
Certifying authenticity via fiber-infused paper. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGecom Exch. ![In: SIGecom Exch. 5(3), pp. 29-37, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
anti-piracy, certificates of authenticity, counterfeit deterrence, security, economics |
20 | Piyali Mandal, Ashish Thakral, Shekhar Verma |
Watermark Based Digital Rights Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (1) ![In: International Symposium on Information Technology: Coding and Computing (ITCC 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, USA, pp. 74-78, 2005, IEEE Computer Society, 0-7695-2315-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Watermarking Body, DRM model, Digital Watermarking, Digital Rights Management, Piracy |
20 | Richard J. Lipton, S. Raj Rajagopalan, Dimitrios N. Serpanos |
Spy: A Method to Secure Clients for Network Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS Workshops ![In: 22nd International Conference on Distributed Computing Systems, Workshops (ICDCSW '02) July 2-5, 2002, Vienna, Austria, Proceedings, pp. 23-28, 2002, IEEE Computer Society, 0-7695-1588-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
anti-piracy, spy, two-minute warning, inverse security pyramid, software, smart cards, digital rights management, content, protection, intellectual property |
20 | Diane Lending, Sandra Slaughter |
Understanding differences in ethical beliefs and behaviors toward software copying: the effects of organization culture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCPR ![In: Proceedings of the ACM SIGCPR Conference on Computer Personnel Research, New Orleans, Louisiana, USA, April 8-10, 1999, pp. 253-260, 1999, ACM, 1-58113-063-5. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
computer education and training, management of information systems, software ethics, computer crime, software piracy |
17 | Marios Tsioufis, Antonios Fytopoulos, Dimitra Kalaitzi, Thomas A. Alexopoulos |
Discovering maritime-piracy hotspots: a study based on AHP and spatio-temporal analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ann. Oper. Res. ![In: Ann. Oper. Res. 335(2), pp. 861-883, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Marios Tsioufis, Antonios Fytopoulos, Dimitra Kalaitzi, Thomas A. Alexopoulos |
Correction to: Discovering maritime-piracy hotspots: a study based on AHP and spatio-temporal analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ann. Oper. Res. ![In: Ann. Oper. Res. 332(1), pp. 1183-1184, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Maohan Liang, Huanhuan Li 0001, Ryan Wen Liu, Jasmine Siu Lee Lam, Zaili Yang |
PiracyAnalyzer: Spatial temporal patterns analysis of global piracy incidents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Reliab. Eng. Syst. Saf. ![In: Reliab. Eng. Syst. Saf. 243, pp. 109877, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Bora Jeong, Gunwoong Lee, Keongtae Kim |
The Impact of Live Sports Broadcasting on Digital Piracy and its Societal Consequences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 57th Hawaii International Conference on System Sciences, HICSS 2024, Hilton Hawaiian Village Waikiki Beach Resort, Hawaii, USA, January 3-6, 2024, pp. 1806-1816, 2024, ScholarSpace, 978-0-9981331-7-1. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
17 | Lili Liu, Changxin Luo |
Decisions of Knowledge Payment Product Supply Chain Considering Government Subsidies and Anti-Piracy Efforts: Based on China's Knowledge Payment Market. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Syst. ![In: Syst. 11(9), pp. 440, September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 669 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ >>] |
|