|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1829 occurrences of 925 keywords
|
|
|
Results
Found 3159 publication records. Showing 3159 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
22 | Volker Tschammer, Vaggelis Ouzounis |
Trading of Intangible Goods - Introduction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 33rd Annual Hawaii International Conference on System Sciences (HICSS-33), 4-7 January, 2000, Maui, Hawaii, USA, 2000, IEEE Computer Society, 0-7695-0493-0. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
22 | Gerald Brose |
A Typed Access Control Model for CORBA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2000, 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings, pp. 88-105, 2000, Springer, 3-540-41031-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Access control, CORBA, types, roles |
22 | Isabel Gallego, Jaime Delgado, Roberto García 0001 |
Use of Mobile Agents for IPR Management and Negotiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MATA ![In: Mobile Agents for Telecommunication Applications, Second International Workshop, MATA 2000, Paris, France, September 18-20, 2000, Proceedings, pp. 205-214, 2000, Springer, 3-540-41069-4. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
22 | Trent Jaeger, Atul Prakash 0001, Jochen Liedtke, Nayeem Islam |
Flexible Control of Downloaded Executable Content. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 2(2), pp. 177-228, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
autorization machanisms, authentication, role-based access control, collaborative systems, access control models |
22 | Xiaoyan He, Lui Sha |
A Fault Tolerant Real-time Publisher/Subscriber Inter-Process Communication Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RTCSA ![In: 6th International Workshop on Real-Time Computing and Applications Symposium (RTCSA '99), 13-16 December 1999, Hong Kong, China, pp. 204-207, 1999, IEEE Computer Society, 0-7695-0306-3. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
22 | Prasun Dewan, Honghai Shen |
Controlling Access in Multiuser Interfaces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Comput. Hum. Interact. ![In: ACM Trans. Comput. Hum. Interact. 5(1), pp. 34-62, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
security, privacy, collaboration, access control, computer-supported cooperative work, groupware, user interface management systems, structure editors |
22 | John A. Bull, Li Gong, Karen R. Sollins |
Towards Security in an Open Systems Federation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings, pp. 3-20, 1992, Springer, 3-540-56246-X. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
21 | Xiangui Kang, Jiwu Huang, Wenjun Zeng, Yun Q. Shi 0001 |
Non-ambiguity of blind watermarking: a revisit with analytical resolution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Ser. F Inf. Sci. ![In: Sci. China Ser. F Inf. Sci. 52(2), pp. 276-285, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Abstract watermarking, ambiguity attack, PRSG sequence, computational indistinguishability, digital rights management (DRM) |
21 | Nitya Narasimhan, Tzvetan Horozov, Joseph F. Wodka, Jehan Wickramasuriya, Venu Vasudevan |
TV clips: using social bookmarking for content discovery in a fragmented TV ecosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MUM ![In: Proceedings of the 8th International Conference on Mobile and Ubiquitous Multimedia, MUM 2009, Cambridge, United Kingdom, November 22-25, 2009, 2009, ACM, 978-1-60558-846-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
content discovery, social sharing, architecture, digital rights management, social bookmarking, television, set-top box |
21 | Renato Iannella |
Towards E-Society Policy Interoperability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
I3E ![In: Software Services for e-Business and e-Society, 9th IFIP WG 6.1 Conference on e-Business, e-Services and e-Society, I3E 2009, Nancy, France, September 23-25, 2009. Proceedings, pp. 369-384, 2009, Springer, 978-3-642-04279-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
E-Society, Policy-Oriented Web, Privacy, Social Networks, Interoperability, Policy Languages, Rights |
21 | Christian Baumann |
Contracting and Copyright Issues for Composite Semantic Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISWC ![In: The Semantic Web - ISWC 2008, 7th International Semantic Web Conference, ISWC 2008, Karlsruhe, Germany, October 26-30, 2008. Proceedings, pp. 895-900, 2008, Springer, 978-3-540-88563-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
automated contracting, semantic web service, copyright, intellectual property rights |
21 | Renato Iannella |
Towards the policy-aware web: the real web 3.0? ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 17th International Conference on World Wide Web, WWW 2008, Beijing, China, April 21-25, 2008, pp. 1251-1252, 2008, ACM, 978-1-60558-085-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
policy-aware web, privacy, identity, rights |
21 | Youngseek Kim, Jessica Howard, Sharad Ravindranath, Joon S. Park |
Problem Analyses and Recommendations in DRM Security Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroISI ![In: Intelligence and Security Informatics, First European Conference, EuroISI 2008, Esbjerg, Denmark, December 3-5, 2008. Proceedings, pp. 165-178, 2008, Springer, 978-3-540-89899-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Security Policy, Digital Rights Management, DRM |
21 | Thomas Franz, Klaas Dellschaft, Steffen Staab |
Unlock Your Data: The Case of MyTag. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FIS ![In: Future Internet - FIS 2008, First Future Internet Symposium, FIS 2008, Vienna, Austria, September 29-30, 2008, Revised Selected Papers, pp. 117-129, 2008, Springer, 978-3-642-00984-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
User rights, User-generated content, Web2.0, Mash-ups |
21 | Oguz Findik, Mehmet Bayrak, Ismail Babaoglu, Emre Çomak |
Color Image Watermarking Scheme Based on Efficient Preprocessing and Support Vector Machines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIC (3) ![In: Advanced Intelligent Computing Theories and Applications. With Aspects of Contemporary Intelligent Computing Techniques, 4th International Conference on Intelligent Computing, ICIC 2008, Shanghai, China, September 15-18, 2008, Proceedings, pp. 398-406, 2008, Springer, 978-3-540-85929-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Color image watermarking, block based digital robust watermarking, support vector machines, intellectual property rights |
21 | Mike Pattrick, Andrew Hogue, Khalil El-Khatib |
A secure digital asset managment network for game development and education. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Play ![In: Proceedings of the 2008 Conference on Future Play: Research, Play, Share, Future Play 2008, Toronto, Ontario, Canada, November 3-5, 2008, pp. 204-207, 2008, ACM, 978-1-60558-218-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security, education, games, 3D model, digital rights management, DRM |
21 | Yousra Alkabani, Farinaz Koushanfar |
N-variant IC design: methodology and applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DAC ![In: Proceedings of the 45th Design Automation Conference, DAC 2008, Anaheim, CA, USA, June 8-13, 2008, pp. 546-551, 2008, ACM, 978-1-60558-115-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
N-variant design, digital rights management, physical security |
21 | Jose Antonio Onieva, Javier López 0001, Rodrigo Roman, Jianying Zhou 0001, Stefanos Gritzalis |
Integration of non-repudiation services in mobile DRM scenarios. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Telecommun. Syst. ![In: Telecommun. Syst. 35(3-4), pp. 161-176, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Mobile applications, Digital rights management, Non-repudiation, Secure electronic commerce |
21 | Mahadevan Gomathisankaran, Akhilesh Tyagi |
Architecture Support for 3D Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 55(5), pp. 497-507, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
secure systems architecture, digital rights management, Obfuscation |
21 | Merv Matson, Mihaela Ulieru |
Persistent information security: beyond the e-commerce threat model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Proceedings of the 8th International Conference on Electronic Commerce: The new e-commerce - Innovations for Conquering Current Barriers, Obstacles and Limitations to Conducting Successful Business on the Internet, 2006, Fredericton, New Brunswick, Canada, August 13-16, 2006, pp. 271-277, 2006, ACM, 1-59593-392-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
document security, insecurity expense, persistent information security, risk remediation, digital rights management, DRM, threat model |
21 | Yonghak Ahn, Myung-Mook Han, Byung-Wook Lee |
DRM Architecture for Mobile VOD Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MRCS ![In: Multimedia Content Representation, Classification and Security, International Workshop, MRCS 2006, Istanbul, Turkey, September 11-13, 2006, Proceedings, pp. 611-618, 2006, Springer, 3-540-39392-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
DRM(Digital Rights Management), Client Manager, Mobile Environments |
21 | Craig W. Thompson, Rishikesh Jena |
Digital Licensing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Comput. ![In: IEEE Internet Comput. 9(4), pp. 85-88, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
digital licensing, reuseable software components, intellectual property rights |
21 | Janne Lahti, Utz Westermann, Marko Palola, Johannes Peltola, Elena Vildjiounaite |
MobiCon: integrated capture, annotation, and sharing of video clips with mobile phones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia ![In: Proceedings of the 13th ACM International Conference on Multimedia, Singapore, November 6-11, 2005, pp. 798-799, 2005, ACM, 1-59593-044-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
mobile video annotation, mobile video sharing, video management, context-awareness, digital rights management |
21 | Jesse C. Bockstedt, Robert J. Kauffman, Frederick J. Riggins |
The Move to Artist-Led Online Music Distribution: Explaining Structural Changes in the Digital Music Market. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 38th Hawaii International Conference on System Sciences (HICSS-38 2005), CD-ROM / Abstracts Proceedings, 3-6 January 2005, Big Island, HI, USA, 2005, IEEE Computer Society, 0-7695-2268-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Digital goods, music distribution, music industry, online music, property rights, value chains, MP3, intermediation, digital music, market structure |
21 | Jaehong Park, Ravi S. Sandhu |
The UCONABC usage control model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 7(1), pp. 128-174, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
privacy, access control, trust, digital rights management, usage control |
21 | Rüdiger Grimm, Patrick Aichroth |
Privacy protection for signed media files: a separation-of-duty approach to the lightweight DRM (LWDRM) system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 6th workshop on Multimedia & Security, MM&Sec 2004, Magdeburg, Germany, September 20-21, 2004, pp. 93-99, 2004, ACM, 1-58113-854-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
LWDRM, light weight digital rights management, virtual goods, privacy, pseudonyms, separation of duty |
21 | Tomoyuki Asano |
Reducing Storage at Receivers in SD and LSD Broadcast Encryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers, pp. 317-332, 2003, Springer, 3-540-20827-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
stateless receiver, master key, subset difference, key management, digital rights management, revocation, broadcast encryption |
21 | Shing-Chi Cheung, Dickson K. W. Chiu |
A Watermarking Infrastructure for Enterprise Document Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 36th Hawaii International Conference on System Sciences (HICSS-36 2003), CD-ROM / Abstracts Proceedings, January 6-9, 2003, Big Island, HI, USA, pp. 105, 2003, IEEE Computer Society, 0-7695-1874-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
document distribution protocols, document management policies, copy deterrence, enterprise registration authority, registration certificate, copyright protection, digital rights management |
21 | Neelu Sinha |
Data Throughput and Robustness Studies in a New Digital Image Watermarking Technique Based upon Adaptive Segmentation and Space-Frequency Representation (WASSFR). ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIAI ![In: 5th IEEE Southwest Symposium on Image Analysis and Interpretation, SSIAI 2002, Santa Fe, New Mexico, USA, April 7-9, 2002, pp. 229-233, 2002, IEEE Computer Society, 0-7695-1537-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
image processing, watermarking, digital rights management |
21 | Richard J. Lipton, S. Raj Rajagopalan, Dimitrios N. Serpanos |
Spy: A Method to Secure Clients for Network Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS Workshops ![In: 22nd International Conference on Distributed Computing Systems, Workshops (ICDCSW '02) July 2-5, 2002, Vienna, Austria, Proceedings, pp. 23-28, 2002, IEEE Computer Society, 0-7695-1588-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
anti-piracy, spy, two-minute warning, inverse security pyramid, software, smart cards, digital rights management, content, protection, intellectual property |
21 | Marek J. Sergot |
A computational theory of normative positions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Comput. Log. ![In: ACM Trans. Comput. Log. 2(4), pp. 581-622, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
logic of action, logic of agency, theory of duties and rights, deontic logic, normative systems |
21 | Vincent Homburg, Albert Jacob Meijer |
Why Would Anybody Like to Share His Knowledge? ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 34th Annual Hawaii International Conference on System Sciences (HICSS-34), January 3-6, 2001, Maui, Hawaii, USA, 2001, IEEE Computer Society, 0-7695-0981-9. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
information assets, ownership structure, property rights theory, knowledge sharing |
21 | Vito Cappellini, Franco Bartolini, Mauro Barni, M. Wada |
Copyright Protection of Cultural Heritage Multimedia Data through Digital Watermarking Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 11th International Workshop on Database and Expert Systems Applications (DEXA'00), 6-8 September 2000, Greenwich, London, UK, pp. 935-939, 2000, IEEE Computer Society, 0-7695-0680-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
cultural heritage multimedia data, intellectual property rights protection, Art Virtual Gallery, World Wide Web, digital watermarking, art, copyright protection |
21 | Jalal Al-Muhtadi, Manish Anand, M. Dennis Mickunas, Roy H. Campbell |
Secure Smart Homes using Jini and UIUC SESAME. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 77-, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
secure smart homes, dynamically configurable consumer devices, distributed security mechanism, Tiny SESAME, distributed devices, Java, Java, access control, distributed processing, public key cryptography, public key cryptography, handheld devices, authorisation, Jini, component-based software, home automation, Kerberos, access rights, Sun Microsystems, smart devices |
21 | Petra Wohlmacher, Peter Pharow |
Applications in Health Care using Public-Key Certificates and Attribute Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 128-137, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
medical administrative data processing, health professional, health professional card, jurisdiction, advertizing, trust center, HARP, European Electronic Signature Directive, European Data Protection Directive, Internet, authenticity, integrity, digital signature, smart cards, smart card, public key cryptography, certification, certificates, confidentiality, health care, auditing, auditing, authorisation, authentication protocol, data protection, permissions, applet, trusted third party, public-key certificates, x.509, access rights, attribute certificates, state of the art, nonrepudiation, security token, security infrastructures |
21 | Michael Gagliardi, Ragunathan Rajkumar, Lui Sha |
Designing for evolvability: building blocks for evolvable real-time systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Real Time Technology and Applications Symposium ![In: 2nd IEEE Real-Time Technology and Applications Symposium, RTAS '96, Boston, MA, USA, June 10-12, 1996, pp. 100-109, 1996, IEEE Computer Society, 0-8186-7448-2. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
evolvable real-time systems, fielded real-time systems, system abstractions, run-time abstractions, replaceable unit abstraction, extensible cell, real-time POSIX testbed, Simplex architecture, Real-Time Publisher/Subscriber communication model, safe evolutionary requirements, communication rights, real-time systems, semantics, software maintenance, distributed processing, Unix, resource reservation, evolvability |
21 | Nicholas Yialelis, Emil Lupu, Morris Sloman |
Role-based security for distributed object systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 5th Workshop on Enabling Technologies, Infrastructure for Collaborative Enterprises (WET-ICE'96), June 19-21, 1996, Stanford, CA, USA, Proceedings, pp. 80-85, 1996, IEEE Computer Society, 0-8186-7445-8. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
role based security, multi organisational enterprise, role framework, obligation policies, domain based authentication service, replicated servers, minimal state, access control, distributed processing, role based access control, security policies, authorisation, security architecture, distributed object systems, access rights, symmetric cryptography, security agents |
21 | I-Lung Kao, Randy Chow |
An Extended Capability Architecture To Enforce Dynamic Access Control Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 12th Annual Computer Security Applications Conference (ACSAC 1996), 9-13 December 1996, San Diego, CA, USA, pp. 148-157, 1996, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
extended capability architecture, dynamic access control policies, user process, object access, access request, centralized access control lists, object protection, capability based systems, static access control policies, access privileges, capability systems, access history, capability management, distributed systems, distributed system, distributed processing, security policies, access rights, object manager, object managers |
21 | Carol J. Orwant |
EPER ethics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ethics in Computer Age ![In: Proceedings of the Conference on Ethics in Computer Age, Galtinburg, Tennessee, USA, November 11-13, 1994, pp. 105-108, 1994, ACM, 0-89791-644-1. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
epers, privacy, agents, anonymity, ethics, accountability, rights |
21 | Luigi Ciminiera, Adriano Valenzano |
Authentication Mechanisms in Microprocessor-Based Local Area Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 15(5), pp. 654-658, 1989. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
authentication mechanisms, microprocessor-based local area networks, unauthorized use, intruders, interface process, user-server connection, unauthorized requests, capability checking, iAPX432-based hosts, database, cache, searching, service, local area networks, security of data, identity, protect, server, hardware support, shared resources, parallel search, access rights, check, performance issues |
20 | Filippo Chiariglione, Giacomo Cosenza, Sergio Matone |
Managing Rights and Value of Digital Media. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, March 16-19, 2009, Fukuoka, Japan, pp. 859-864, 2009, IEEE Computer Society, 978-1-4244-3572-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Michael E. Lesk |
Digital Rights Management and Individualized Pricing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 6(3), pp. 76-79, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Claudio Lucchese, Michail Vlachos, Deepak Rajan, Philip S. Yu |
Rights Protection of Trajectory Datasets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE ![In: Proceedings of the 24th International Conference on Data Engineering, ICDE 2008, April 7-12, 2008, Cancún, Mexico, pp. 1349-1351, 2008, IEEE Computer Society, 978-1-4244-1836-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Dukrok Suh, Junseok Hwang, Donghyun Oh |
Do Software Intellectual Property Rights Affect the Performance of Firms? Case Study of South Korea. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSEA ![In: Proceedings of the Third International Conference on Software Engineering Advances, ICSEA 2008, October 26-31, 2008, Sliema, Malta, pp. 307-312, 2008, IEEE Computer Society, 978-0-7695-3372-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Shujuan Wang, Qingtang Liu |
ERDRM: A Digital Rights Management System Model for Educational Resources. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWL ![In: Advances in Web Based Learning - ICWL 2008, 7th International Conference, Jinhua, China, August 20-22, 2008. Proceedings, pp. 69-78, 2008, Springer, 978-3-540-85032-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
distance education, DRM, intellectual property protection, educational resources |
20 | Nadzeya Kiyavitskaya, Nicola Zeni, Travis D. Breaux, Annie I. Antón, James R. Cordy, Luisa Mich, John Mylopoulos |
Automating the Extraction of Rights and Obligations for Regulatory Compliance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ER ![In: Conceptual Modeling - ER 2008, 27th International Conference on Conceptual Modeling, Barcelona, Spain, October 20-24, 2008. Proceedings, pp. 154-168, 2008, Springer, 978-3-540-87876-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Yousra Alkabani, Farinaz Koushanfar |
Active control and digital rights management of integrated circuit IP cores. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CASES ![In: Proceedings of the 2008 International Conference on Compilers, Architecture, and Synthesis for Embedded Systems, CASES 2008, Atlanta, GA, USA, October 19-24, 2008, pp. 227-234, 2008, ACM. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
active IP control, security, IP protection |
20 | Leah Epstein, Amos Fiat, Meital Levy |
Caching Content under Digital Rights Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WAOA ![In: Approximation and Online Algorithms, 6th International Workshop, WAOA 2008, Karlsruhe, Germany, September 18-19, 2008. Revised Papers, pp. 188-200, 2008, Springer, 978-3-540-93979-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Hristo Koshutanski, Fabio Massacci |
A Negotiation Scheme for Access Rights Establishment in Autonomic Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Netw. Syst. Manag. ![In: J. Netw. Syst. Manag. 15(1), pp. 117-136, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
policy based access management, algorithms, access control, protocols, trust negotiation, logic reasoning |
20 | Radu Sion |
Rights Assessment for Relational Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secure Data Management in Decentralized Systems ![In: Secure Data Management in Decentralized Systems, pp. 427-457, 2007, Springer, 978-0-387-27694-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Adolf Hohl, Alf Zugenmaier |
Safeguarding Personal Data using Rights Management in Distributed Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa, pp. 449-456, 2007, Springer, 978-0-387-72366-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Franz Kollmann |
Realizing fine-granular Read andWrite Rights on Tree Structured Documents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria, pp. 517-523, 2007, IEEE Computer Society, 0-7695-2775-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Donghyun Choi, Yunho Lee, Hogab Kang, Seungjoo Kim, Dongho Won |
An Efficient and Secure Rights Sharing Method for DRM System Against Replay Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007, Proceedings, pp. 135-145, 2007, Springer, 978-3-540-73546-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Maciej Brzozowski, Vyacheslav N. Yarmolik |
Obfuscation as Intellectual Rights Protection in VHDL Language. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISIM ![In: 6th International Conference on Computer Information Systems and Industrial Management Applications, CISIM 2007, Elk, Poland, June 28-30, 2007, pp. 337-340, 2007, IEEE Computer Society, 0-7695-2894-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
20 | ByungRae Cha, Kyungjun Kim, Dongseob Lee |
Study of Digital License Search for Intellectual Property Rights of S/W Source Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings. Part III, pp. 201-212, 2007, Springer, 978-3-540-74482-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Nadzeya Kiyavitskaya, Nicola Zeni, Travis D. Breaux, Annie I. Antón, James R. Cordy, Luisa Mich, John Mylopoulos |
Extracting rights and obligations from regulations: toward a tool-supported process. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASE ![In: 22nd IEEE/ACM International Conference on Automated Software Engineering (ASE 2007), November 5-9, 2007, Atlanta, Georgia, USA, pp. 429-432, 2007, ACM, 978-1-59593-882-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
regulation compliance, tool support, privacy requirements |
20 | |
Peer-to-Peer Systems and Digital Rights Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Multimedia ![In: Encyclopedia of Multimedia, 2006, Springer, 978-0-387-24395-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Jen-Hao Hsiao, Cheng-Hung Li, Chih-Yi Chiu, Jenq-Haur Wang, Chu-Song Chen, Lee-Feng Chien |
Effective Content Tracking for Digital Rights Management in Digital Libraries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECDL ![In: Research and Advanced Technology for Digital Libraries, 10th European Conference, ECDL 2006, Alicante, Spain, September 17-22, 2006, Proceedings, pp. 415-425, 2006, Springer, 3-540-44636-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Bill Vassiliadis, Vassilis E. Fotopoulos, Athanassios N. Skodras |
Decentralising the Digital Rights Management Value Chain by means of Distributed License Catalogues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIAI ![In: Artificial Intelligence Applications and Innovations, 3rd IFIP Conference on Artificial Intelligence Applications and Innovations (AIAI) 2006, June 7-9, 2006, Athens, Greece, pp. 689-696, 2006, Springer, 0-387-34223-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Roberto García 0001, Rosa Gil 0001 |
An OWL Copyright Ontology for Semantic Digital Rights Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Workshops (2) ![In: On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, OTM Confederated International Workshops and Posters, AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerSys, OTM Academy Doctoral Consortium, RDDS, SWWS, and SeBGIS 2006, Montpellier, France, October 29 - November 3, 2006. Proceedings, Part II, pp. 1745-1754, 2006, Springer, 3-540-48273-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Junil Kim, Yeonjeong Jeong, Kisong Yoon, Jaecheol Ryou 0001 |
A trustworthy end-to-end key management scheme for digital rights management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia ![In: Proceedings of the 14th ACM International Conference on Multimedia, Santa Barbara, CA, USA, October 23-27, 2006, pp. 635-638, 2006, ACM, 1-59593-447-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
key management, DRM, content protection |
20 | Jürgen Nützel, Anja Beyer |
How to Increase the Security of Digital Rights Management Systems Without Affecting Consumer's Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ETRICS ![In: Emerging Trends in Information and Communication Security, International Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006, Proceedings, pp. 368-380, 2006, Springer, 3-540-34640-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Goo-Rak Kwon, Kwan-Hee Lee, Sang-Jae Nam, Sung-Jea Ko |
Intellectual Property Rights Management Using Combination Encryption in MPEG-4. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDW ![In: Digital Watermarking, 5th International Workshop, IWDW 2006, Jeju Island, Korea, November 8-10, 2006, Proceedings, pp. 188-196, 2006, Springer, 3-540-48825-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Jie Guo, Yingjiu Li, Robert H. Deng, Kefei Chen |
Rights Protection for Data Cubes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings, pp. 359-372, 2006, Springer, 3-540-38341-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Mina Deng, Lothar Fritsch, Klaus Kursawe |
Personal Rights Management - Taming Camera-Phones for Individual Privacy Enforcement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers, pp. 172-189, 2006, Springer, 3-540-68790-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
model for privacy infrastructures, data identification techniques, privacy protection, mobile camera phones |
20 | Taojun Wu, Liang Dai 0001, Yuan Xue 0001, Yi Cui 0001 |
Digital Rights Management for Video Sensor Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISM ![In: Eigth IEEE International Symposium on Multimedia (ISM 2006), 11-13 December 2006, San Diego, CA, USA, pp. 131-138, 2006, IEEE Computer Society, 0-7695-2746-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Josep Pegueroles, Marcel Fernandez, Francisco Rico-Novella, Miguel Soriano |
A Practical Solution for Distribution Rights Protection in Multicast Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part III, pp. 527-536, 2006, Springer, 3-540-34075-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Stefan Bechtold |
The Present and Future of Digital Rights Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AXMEDIS ![In: Proceedings of the Second International Conference on Automated Production of Cross Media Content for Multi-Channel Distribution, AXMEDIS 2006, Leeds, UK, December 13-15, 2006, pp. 6-7, 2006, IEEE Computer Society, 0-7695-2625-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Jürgen Nützel, Anja Beyer |
Towards Trust in Digital Rights Management Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust and Privacy in Digital Business, Third International Conference, TrustBus 2006, Krakow, Poland, September 4-8, 2006, Proceedings, pp. 162-171, 2006, Springer, 3-540-37750-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Shinichi Suzuki, Yasushi Shinjo, Toshio Hirotsu, Kozo Itano, Kazuhiko Kato |
Capability-Based Egress Network Access Control for Transferring Access Rights. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITA (2) ![In: Third International Conference on Information Technology and Applications (ICITA 2005), 4-7 July 2005, Sydney, Australia, pp. 488-495, 2005, IEEE Computer Society, 0-7695-2316-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Travis D. Breaux, Annie I. Antón |
Analyzing Goal Semantics for Rights, Permissions, and Obligations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RE ![In: 13th IEEE International Conference on Requirements Engineering (RE 2005), 29 August - 2 September 2005, Paris, France, pp. 177-188, 2005, IEEE Computer Society, 0-7695-2425-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Thomas Mundt |
Location Dependent Digital Rights Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), 27-30 June 2005, Murcia, Cartagena, Spain, pp. 617-622, 2005, IEEE Computer Society, 0-7695-2373-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Miguel Soriano, Stephan Flake, Jürgen Tacken, Frank Bormann, Joan Tomàs |
Mobile Digital Rights Management: Security Requirements and Copy Detection Mechanisms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 16th International Workshop on Database and Expert Systems Applications (DEXA 2005), 22-26 August 2005, Copenhagen, Denmark, pp. 251-256, 2005, IEEE Computer Society, 0-7695-2424-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Jaspal S. Sandhu, Jonathan Hey, Catherine Newman, Alice M. Agogino |
Informal Health and Legal Rights Education in Rural, Agricultural Communities Using Mobile Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALT ![In: Proceedings of the 5th IEEE International Conference on Advanced Learning Technologies, ICALT 2005, Kaohsiung, Taiwan, July 5-8, 2005, pp. 988-992, 2005, IEEE Computer Society, 0-7695-2338-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Shu-Fen Tu, Ching-Sheng Hsu |
A Digital Rights Management Approach for Gray-Level Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAPR (2) ![In: Pattern Recognition and Image Analysis, Third International Conference on Advances in Pattern Recognition, ICAPR 2005, Bath, UK, August 22-25, 2005, Proceedings, Part II, pp. 39-47, 2005, Springer, 3-540-28833-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Tarjei Kristiansen |
Merchant Transmission Expansion Based on Financial Transmission Rights. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 38th Hawaii International Conference on System Sciences (HICSS-38 2005), CD-ROM / Abstracts Proceedings, 3-6 January 2005, Big Island, HI, USA, 2005, IEEE Computer Society, 0-7695-2268-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Zongkai Yang, Qingtang Liu, Kun Yan, Wanting Deng, Jing Jin |
Integration of Digital Rights Management into Learning Content Management System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (1) ![In: International Symposium on Information Technology: Coding and Computing (ITCC 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, USA, pp. 465-469, 2005, IEEE Computer Society, 0-7695-2315-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Bill Vassiliadis, Vassilis E. Fotopoulos, A. Ilias, Athanassios N. Skodras |
Protecting Intellectual Property Rights and the JPEG2000 Coding Standard. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Panhellenic Conference on Informatics ![In: Advances in Informatics, 10th Panhellenic Conference on Informatics, PCI 2005, Volos, Greece, November 11-13, 2005, Proceedings, pp. 705-715, 2005, Springer, 3-540-29673-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Petar Djekic, Claudia Löbbecke |
Software Piracy Prevention through Digital Rights Management Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CEC ![In: 7th IEEE International Conference on E-Commerce Technology (CEC 2005), 19-22 July 2005, München, Germany, pp. 504-507, 2005, IEEE Computer Society, 0-7695-2277-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Jacques J. A. Fournier, Simon W. Moore |
A Vector Approach to Cryptography Implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DRMTICS ![In: Digital Rights Management: Technologies, Issues, Challenges and Systems, First International Conference, DRMTICS 2005, Sydney, Australia, October 31 - November 2, 2005, Revised Selected Papers, pp. 277-297, 2005, Springer, 3-540-35998-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Cryptography, AES, RSA, vector architecture, Montgomery Modular Multiplication |
20 | Ulrich Greveler |
Enforcing Regional DRM for Multimedia Broadcasts With and Without Trusted Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DRMTICS ![In: Digital Rights Management: Technologies, Issues, Challenges and Systems, First International Conference, DRMTICS 2005, Sydney, Australia, October 31 - November 2, 2005, Revised Selected Papers, pp. 332-340, 2005, Springer, 3-540-35998-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Claudine Conrado, Milan Petkovic, Willem Jonker |
Privacy-Preserving Digital Rights Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secure Data Management ![In: Secure Data Management, VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings, pp. 83-99, 2004, Springer, 3-540-22983-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
20 | William Ku, Chi-Hung Chi |
Survey on the Technological Aspects of Digital Rights Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings, pp. 391-403, 2004, Springer, 3-540-23208-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Yinyan Yu, Zhi Tang 0001 |
An Adaptive Approach to Hardware Alteration for Digital Rights Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers, pp. 238-250, 2004, Springer, 3-540-24015-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Aleksandr Rudkevich |
Investment and Bidding Strategies in Markets for Firm Transmission Rights. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 37th Hawaii International Conference on System Sciences (HICSS-37 2004), CD-ROM / Abstracts Proceedings, 5-8 January 2004, Big Island, HI, USA, 2004, IEEE Computer Society, 0-7695-2056-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Gunhee Kim, Dongkyoo Shin, Dongil Shin |
An Effective Adaptation of Encryption on MPEG-4 Video Streams for Digital Rights Management in an Ubiquitous Computing Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC ![In: Embedded and Ubiquitous Computing, International Conference EUC 2004, Aizu-Wakamatsu City, Japan, August 25-27, 2004, Proceedings, pp. 642-651, 2004, Springer, 3-540-22906-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Eva Rodríguez, Silvia Llorente, Jaime Delgado |
Use of Rights Expression Languages for Protecting Multimedia Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WEDELMUSIC ![In: 4th International Conference on WEB Delivering of Music (WEDELMUSIC 2004), 13-15 September 2004, Barcelona, Spain, pp. 70-77, 2004, IEEE Computer Society, 0-7695-2157-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Bok-Nyong Park, Jae-Won Kim, Wonjun Lee 0001 |
PrecePt: A Privacy-Enhancing License Management Protocol for Digital Rights Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (1) ![In: 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 29-31 March 2004, Fukuoka, Japan, pp. 574-579, 2004, IEEE Computer Society, 0-7695-2051-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
License Management Protocol, Privacy, Anonymity, Public-Key Cryptosystem, DRM |
20 | Ruth Breu, Gerhard Popp |
Actor-Centric Modeling of User Rights. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FASE ![In: Fundamental Approaches to Software Engineering, 7th International Conference, FASE 2004, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2004 Barcelona, Spain, March 29 - april 2, 2004, Proceedings, pp. 165-179, 2004, Springer, 3-540-21305-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Matt Blaze |
Rights Amplification in Master-Keyed Mechanical Locks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 1(2), pp. 24-32, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Thais Helena Bigliazzi Garcia, Irineu Theiss, Patrícia Bonina Zimath, Hugo Cesar Hoeschl, Fabrício Tadeu Donatti, Gean Marques Loureiro, Tânia C. D'Agostini Bueno |
Consumer-SC: An e-Gov Portal for Consumers Rights Protection in Brazil. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EGOV ![In: Electronic Government, Second International Conference, EGOV 2003, Prague, Czech Republic, September 1-5, 2003, Proceedings, pp. 151-156, 2003, Springer, 3-540-40845-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Jaime Delgado, Isabel Gallego, Silvia Llorente, Roberto García 0001 |
Regulatory Ontologies: An Intellectual Property Rights Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Workshops ![In: On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops, OTM Confederated International Workshops, HCI-SWWA, IPW, JTRES, WORM, WMS, and WRSM 2003, Catania, Sicily, Italy, November 3-7, 2003, Proceedings, pp. 621-634, 2003, Springer, 3-540-20494-6. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Cheun Ngen Chong, Sandro Etalle, Pieter H. Hartel |
Comparing Logic-Based and XML-Based Rights Expression Languages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Workshops ![In: On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops, OTM Confederated International Workshops, HCI-SWWA, IPW, JTRES, WORM, WMS, and WRSM 2003, Catania, Sicily, Italy, November 3-7, 2003, Proceedings, pp. 779-792, 2003, Springer, 3-540-20494-6. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Goichiro Hanaoka, Kazuto Ogawa, Itsuro Murota, Go Ohtake, Keigo Majima, Kimiyuki Oyamada, Seiichi Gohshi, Seiichi Namba, Hideki Imai |
Separating Encryption and Key Issuance in Digital Rights Management Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings, pp. 365-376, 2003, Springer, 3-540-40515-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Makoto Amamiya, Keith L. Clark, Tadashige Iwao, Frank G. McCabe, Makoto Okada, Jeremy Pitt |
Individual Digital Rights Management in Multi-agent Information Trading Societies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MAMUS ![In: Multi-Agent for Mass User Support, International Workshop, MAMUS 2003 Acapulco, Mexico, August 10, 2003 Revised and Invited Papers, pp. 154-173, 2003, Springer, 3-540-21940-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Alexander Iliev, Sean W. Smith |
Prototyping an Armored Data Vault: Rights Management on Big Brother's Computer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, Second International Workshop, PET 2002, San Francisco, CA, USA, April 14-15, 2002, Revised Papers, pp. 144-159, 2002, Springer, 3-540-00565-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
20 | Radek Vingralek, Umesh Maheshwari, William Shapiro |
TDB: A Database System for Digital Rights Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDBT ![In: Advances in Database Technology - EDBT 2002, 8th International Conference on Extending Database Technology, Prague, Czech Republic, March 25-27, Proceedings, pp. 701-711, 2002, Springer, 3-540-43324-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
20 | Tomas Sander |
Golden Times for Digital Rights Management? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, 5th International Conference, FC 2001, Grand Cayman, British West Indies, February 19-22, 2002, Proceedings, pp. 55-65, 2001, Springer, 3-540-44079-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP BibTeX RDF |
|
20 | Yair Frankel |
Protecting Digital Rights. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, 5th International Conference, FC 2001, Grand Cayman, British West Indies, February 19-22, 2002, Proceedings, pp. 42-44, 2001, Springer, 3-540-44079-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP BibTeX RDF |
|
20 | Jaime Delgado, Isabel Gallego, Xavier Perramon |
Broker-Based Secure Negotiation of Intellectual Property Rights. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 4th International Conference, ISC 2001, Malaga, Spain, October 1-3, 2001, Proceedings, pp. 486-496, 2001, Springer, 3-540-42662-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
Displaying result #401 - #500 of 3159 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ >>] |
|