Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
17 | Mauro Barni, Franco Bartolini |
Data hiding for fighting piracy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Signal Process. Mag. ![In: IEEE Signal Process. Mag. 21(2), pp. 28-39, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Mark Van Hoorebeek |
Health and safety and piracy: legal risk minimisation in libraries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Electron. Libr. ![In: Electron. Libr. 22(3), pp. 231-237, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Joseph Nyiri |
The effects of piracy in a university setting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Crossroads ![In: ACM Crossroads 10(3), pp. 3, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Ginger Myles |
Using software watermarking to discourage piracy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Crossroads ![In: ACM Crossroads 10(3), pp. 2, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Louis Jezsik |
Why are you stealing that software: piracy in South East Asia. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ubiquity ![In: Ubiquity 2004(July), pp. 1, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Eric S. Kyper, Rodrigo J. Lievano, Paul Mangiameli, SeungJae Shin |
Software piracy: A time-series Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AMCIS ![In: 10th Americas Conference on Information Systems, AMCIS 2004, New York, NY, USA, August 6-8, 2004, pp. 61, 2004, Association for Information Systems. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
17 | Neil Morton |
Understanding Attitudes toward Online Music Piracy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AMCIS ![In: 10th Americas Conference on Information Systems, AMCIS 2004, New York, NY, USA, August 6-8, 2004, pp. 57, 2004, Association for Information Systems. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
17 | Vi Lam, Jerome Moscicki |
Rethinking digital piracy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWI ![In: Proceedings of the IADIS International Conference WWW/Internet 2004, Madrid, Spain, 2 Volumes, pp. 1003-1008, 2004, IADIS, 972-99353-0-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
17 | Alvin Stauber |
The New Vigilantism: Combating the Piracy of Copyrighted Materials on Peer-To-Peer Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEB ![In: The Fourth International Conference on Electronic Business - Shaping Business Strategy in a Networked World, pp. 1374-1378, 2004, Academic Publishers/World Publishing Corporation, 7-5062-7342-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
17 | Marc Fetscherin, Sabrina Zaugg |
Music Piracy on Peer-to-Peer Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EEE ![In: 2004 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 04), 29-31 March 2004, Taipei, Taiwan, pp. 431-440, 2004, IEEE Computer Society, 0-7695-2073-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Alok Gupta, Ramnath K. Chellappa |
Ethical, Legal and Economic Issues in the Digital Economy: Intellectual Property Rights, Piracy, Trust, Security and Privacy: Minitrack Introduction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 37th Hawaii International Conference on System Sciences (HICSS-37 2004), CD-ROM / Abstracts Proceedings, 5-8 January 2004, Big Island, HI, USA, 2004, IEEE Computer Society, 0-7695-2056-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Ranjan B. Kini, H. V. Ramakrishna, B. S. Vijayaraman |
An exploratory study of moral intensity regarding software piracy of students in Thailand. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Behav. Inf. Technol. ![In: Behav. Inf. Technol. 22(1), pp. 63-70, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Gleb Naumovich, Nasir D. Memon |
Preventing Piracy, Reverse Engineering, and Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 36(7), pp. 64-71, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Linda Dailey Paulson |
News Briefs Topics include: Nanotech RAM Holds Promise for Universal Memory / US Court Establishes Protection against Reverse Engineering / Using Web Crawlers to Fight Piracy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 36(9), pp. 15-17, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Trevor T. Moores |
The effect of national culture and economic wealth on global software piracy rates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 46(9), pp. 207-215, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Robert F. Easley, John G. Michel, Sarv Devaraj |
The MP3 open standard and the music industry's response to Internet piracy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 46(11), pp. 90-96, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Sudip Bhattacharjee, Ram D. Gopal, G. Lawrence Sanders |
Digital music and online sharing: software piracy 2.0? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 46(7), pp. 107-111, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Stephen P. King, Ryan Lampe |
Network externalities, price discrimination and profitable piracy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Econ. Policy ![In: Inf. Econ. Policy 15(3), pp. 271-290, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
17 | E. Eugene Schultz |
Security views: Online piracy battle heats up in US. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 22(6), pp. 464-473, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
17 | A. Graham Peace, Dennis F. Galletta, James Y. L. Thong |
Software Piracy in the Workplace: A Model and Empirical Test. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Manag. Inf. Syst. ![In: J. Manag. Inf. Syst. 20(1), pp. 153-177, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Ramnath K. Chellappa, Shivendu Shivendu |
Economic Implications of Variable Technology Standards for Movie Piracy in a Global Context. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Manag. Inf. Syst. ![In: J. Manag. Inf. Syst. 20(2), 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Terry Costlow |
In Brief - Piracy, Advertising Groups Target Spyware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Distributed Syst. Online ![In: IEEE Distributed Syst. Online 4(6), 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
17 | Orneita Burton, T. S. Raghu 0001, Rajiv K. Sinha, Ajay S. Vinze |
Software Piracy: An Empirical Examination of the Impact of Network Externalities and Open Source Alternatives on Willingness to Pay. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AMCIS ![In: 9th Americas Conference on Information Systems, AMCIS 2003, Tampa, FL, USA, August 4-6, 2003, pp. 218, 2003, Association for Information Systems. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
17 | Shin-yi Wu, Pei-Yu Sharon Chen, G. Anandalingam |
Fighting Information Good Piracy with Versioning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIS ![In: Proceedings of the International Conference on Information Systems, ICIS 2003, December 14-17, 2003, Seattle, Washington, USA, pp. 617-629, 2003, Association for Information Systems. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
17 | A. Graham Peace |
Software Piracy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Information Systems ![In: Encyclopedia of Information Systems, pp. 131-142, 2002, Academic Press, 978-0-12-227240-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
17 | Laurie E. MacDonald, Kenneth T. Fougere |
Software Piracy: A Study of the Extent of Coverage in Introductory MIS Textbooks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Syst. Educ. ![In: J. Inf. Syst. Educ. 13(4), pp. 325-330, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
17 | Xiaohua Zeng, Sang-Yong Tom Lee, Hock-Hai Teo |
Impact Of Online Renting On Software Piracy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECIS ![In: Proceedings of the 10th European Conference on Information Systems, Information Systems and the Future of the Digital Economy, ECIS 2002, Gdansk, Poland, June 6-8, 2002, pp. 1320-1329, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
17 | H. V. Ramakrishna, Ranjan B. Kini, B. S. Vijayaraman |
Shaping of Moral Intensity regarding Software Piracy in University Students: Immediate Community Effects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Inf. Syst. ![In: J. Comput. Inf. Syst. 41(4), pp. 47-51, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP BibTeX RDF |
|
17 | Lynette Owen |
Piracy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Learn. Publ. ![In: Learn. Publ. 14(1), pp. 67-70, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
17 | Frederick Gallegos |
Software Piracy: Some Facts, Figures, and Issues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Secur. J. A Glob. Perspect. ![In: Inf. Secur. J. A Glob. Perspect. 8(4), pp. 1-23, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Md. Mahbubur Rahim, Mohd. Noah Abd. Rahman, Afzaal H. Seyal |
Software piracy among academics: an empirical study in Brunei Darussalam. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Manag. Comput. Secur. ![In: Inf. Manag. Comput. Secur. 8(1), pp. 14-26, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Diane Crawford |
Forum: Software piracy is not just economics anymore. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 43(12), pp. 11-13, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Ram D. Gopal, G. Lawrence Sanders |
Global software piracy: you can't get blood out of a turnip. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 43(9), pp. 82-89, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Trevor T. Moores, Gurpreet Dhillon |
Software piracy: a view from Hong Kong. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 43(12), pp. 88-93, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Herman T. Tavani |
Defining the boundaries of computer crime: piracy, break-ins, and sabotage in cyberspace. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCAS Comput. Soc. ![In: SIGCAS Comput. Soc. 30(3), pp. 3-9, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Jessica Litman |
Lunch speaker: Jessica Litman: The Demonization of Piracy. Location: Frontenac Ballroom. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CFP ![In: Proceedings of the Tenth Conference on Computers, Freedom and Privacy: Challenging the Assumptions, CFP 2000, Toronto, Ontario, Canada, April 4-7, 2000, pp. 5, 2000, ACM, 978-1-58113-256-4. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Susan J. Harrington |
Software piracy: are Robin Hood and responsibility denial at work? ![Search on Bibsonomy](Pics/bibsonomy.png) |
IRMA Conference ![In: Challenges of Information Technology Management in the 21st Century, 2000 Information Resources Management Association International Conference, Anchorage, Alaska, USA, May 21-24, 2000, pp. 83-87, 2000, IDEA Group Publishing, 1-878289-84-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP BibTeX RDF |
|
17 | Michael E. Whitman, Anthony M. Townsend, Robert J. Aalberts |
Cybersquatting: A Case of First Come/First Served or Piracy on the Cyber-Seas? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Secur. J. A Glob. Perspect. ![In: Inf. Secur. J. A Glob. Perspect. 8(1), pp. 11-14, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
17 | James Couser |
Software piracy and the Doris Day Syndrome: some legal, ethical and social implications of contemporary conceptions of property. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Law Inf. Technol. ![In: Int. J. Law Inf. Technol. 7(1), pp. 1-50, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
17 | Paul B. Schneck |
Persistent access control to prevent piracy of digital information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. IEEE ![In: Proc. IEEE 87(7), pp. 1239-1250, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
17 | Md. Mahbubur Rahim, Afzaal H. Seyal, Mohd. Noah Abd. Rahman |
Software piracy among computing students: a Bruneian scenario. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Educ. ![In: Comput. Educ. 32(4), pp. 301-321, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
17 | Moez Limayem, Mohamed Khalifa 0001, Wynne W. Chin |
Factors motivating software piracy: a longitudinal study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIS ![In: Proceedings of the Twentieth International Conference on Information Systems, ICIS 1999, Charlotte, North Carolina, USA, December 13-15, 1999, pp. 124-131, 1999, Association for Information Systems. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP BibTeX RDF |
|
17 | Darryl A. Seale, Michael Polakowski, Sherry Schneider |
It's not really theft!: Personal and workplace ethics that enable software piracy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Behav. Inf. Technol. ![In: Behav. Inf. Technol. 17(1), pp. 27-40, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
17 | Ram D. Gopal, G. Lawrence Sanders |
International Software Piracy: Analysis of Key Issues and Impacts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. Res. ![In: Inf. Syst. Res. 9(4), pp. 380-397, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
17 | Roger A. Coldwell |
Did Chuck Babbage Predict Software Piracy? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 41(8), pp. 25-27, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
17 | Clifford M. Koen Jr., Jin H. Im |
Software piracy and its legal implications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Manag. ![In: Inf. Manag. 31(5), pp. 265-272, 1997. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
17 | Karl Dakin |
Softlaw: What If There Were No Software Piracy? ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Softw. ![In: IEEE Softw. 14(1), pp. 20-21, 1997. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
17 | Ram D. Gopal, G. Lawrence Sanders |
Preventive and Deterrent Controls for Software Piracy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Manag. Inf. Syst. ![In: J. Manag. Inf. Syst. 13(4), pp. 29-48, 1997. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
17 | Philip A. Redding |
Report on the Protection Afforded Computer Software in the Face of Computer Software Piracy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Law Technol. ![In: J. Inf. Law Technol. 1996(3), 1996. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP BibTeX RDF |
|
17 | A. Graham Peace, Dennis F. Galletta |
Developing a Predictive Model of Software Piracy Behavior: An Empirical Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIS ![In: Proceedings of the Seventeenth International Conference on Information Systems, Cleveland, Ohio, USA, December 16-18, 1996, pp. 15, 1996, Association for Information Systems. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP BibTeX RDF |
|
17 | Gérard Gabella, Marie-Dominique Picasso |
PC software industry lost $8.08 billion to pirates in 1994 piracy rate in the US declines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Manag. ![In: Inf. Manag. 29(5), pp. 285-288, 1995. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
17 | C. Ian Kyer |
Software piracy & corporate compliance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Law Secur. Rev. ![In: Comput. Law Secur. Rev. 10(5), pp. 245-246, 1994. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
17 | Harold W. Thimbleby |
Controversy corner : An organizational solution to piracy and viruses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Syst. Softw. ![In: J. Syst. Softw. 25(2), pp. 207-215, 1994. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
17 | Diana E. D'Angelo |
You don't have to look like a pirate to be one - the role of academic computing in software piracy deterrence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 21st Annual ACM SIGUCCS Conference on User Services, November 7-10, 1993, San Diego, California, USA, pp. 225-237, 1993, ACM, 0-89791-631-X. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
17 | Jin H. Im, Pamela D. Van Epps |
Software piracy and software security measures in business schools. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Manag. ![In: Inf. Manag. 23(4), pp. 193-203, 1992. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
17 | Ram D. Gopal, G. Lawrence Sanders |
The Effect of Preventive and Deterrent Software Piracy Strategies on Producer Profits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIS ![In: Proceedings of the Thirteenth International Conference on Information Systems, Dallas, Texas, USA, December 13-16, 1992, pp. 161-170, 1992, Association for Information Systems. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP BibTeX RDF |
|
17 | David P. Lewis |
Application of anti-piracy provisions of the copyright act 1968. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Law Secur. Rev. ![In: Comput. Law Secur. Rev. 7(1), pp. 35-36, 1991. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
17 | Jin H. Im, Pamela D. Van Epps |
Software Piracy and Software Security in Business Schools: An Ethical Perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Base ![In: Data Base 22(3), pp. 15-21, 1991. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
17 | Jin H. Im, Clifford M. Koen Jr. |
Software piracy and responsibilities of educational institutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Manag. ![In: Inf. Manag. 18(4), pp. 189-194, 1990. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
17 | Hans Gliss |
East Germany - haven for software piracy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 9(5), pp. 391-393, 1990. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
17 | Eric Zabinski |
Supply, demand, and piracy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCAS Comput. Soc. ![In: SIGCAS Comput. Soc. 20(4), pp. 4-6, 1990. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
17 | Eli B. Cohen, Larry W. Cornwell |
College Students Believe Piracy is Acceptable. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Syst. Educ. ![In: J. Inf. Syst. Educ. 1(3), pp. 2-5, 1989. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP BibTeX RDF |
|
17 | Mark B. Johnson |
Software piracy: stopping it before it stops you. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 16th annual ACM SIGUCCS Conference on User Services, Long Beach, CA, USA, October 30 - November 02, 1988, pp. 295-299, 1988, ACM, 0-89791-286-1. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
|
17 | Robert Hay |
Software piracy in the U.K. - A review. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Law Secur. Rev. ![In: Comput. Law Secur. Rev. 2(3), pp. 10-12, 1986. The full citation details ...](Pics/full.jpeg) |
1986 |
DBLP DOI BibTeX RDF |
|
17 | Richard H. Stern |
Distinguishing Legitimate Reverse Engineering from Unlawful Chip Piracy under the Semiconductor Chip Protection Act. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPCON ![In: Spring COMPCON'86, Digest of Papers, Thirty-First IEEE Computer Society International Conference, San Francisco, California, USA, March 3-6, 1986, pp. 34-39, 1986, IEEE Computer Society, 0-8186-0692-4. The full citation details ...](Pics/full.jpeg) |
1986 |
DBLP BibTeX RDF |
|
17 | Douglas J. Albert, Stephen P. Morse |
Combatting Software Piracy by Encryption and Key Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 17(4), pp. 68-73, 1984. The full citation details ...](Pics/full.jpeg) |
1984 |
DBLP DOI BibTeX RDF |
|
17 | Tim Maude, Derwent Maude |
Hardware Protection Against Software Piracy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 27(9), pp. 950-959, 1984. The full citation details ...](Pics/full.jpeg) |
1984 |
DBLP DOI BibTeX RDF |
|
17 | Morrison Bump Jr. |
A primer on software piracy cases in the courts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 3(2), pp. 123-134, 1984. The full citation details ...](Pics/full.jpeg) |
1984 |
DBLP DOI BibTeX RDF |
|
17 | Peter S. Vogel |
"Software Piracy and protection". ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Annual Conference ![In: Proceedings of the ACM 1982 Annual Conference, Dallas, TX, USA, October 25-27, 1982, pp. 50, 1982, ACM, 978-0-89791-085-9. The full citation details ...](Pics/full.jpeg) |
1982 |
DBLP DOI BibTeX RDF |
|
17 | Calvin N. Mooers |
Preventing Software Piracy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 10(3), pp. 29-30, 1977. The full citation details ...](Pics/full.jpeg) |
1977 |
DBLP DOI BibTeX RDF |
|
12 | Leah Hoffmann |
Content control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 52(6), pp. 16-17, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Ehsan Amiri, Gábor Tardos |
High rate fingerprinting codes and the fingerprinting capacity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SODA ![In: Proceedings of the Twentieth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2009, New York, NY, USA, January 4-6, 2009, pp. 336-345, 2009, SIAM, 978-0-89871-680-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Haibo Chen 0001, Liwei Yuan, Xi Wu 0001, Binyu Zang, Bo Huang 0002, Pen-Chung Yew |
Control flow obfuscation with information flow tracking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MICRO ![In: 42st Annual IEEE/ACM International Symposium on Microarchitecture (MICRO-42 2009), December 12-16, 2009, New York, New York, USA, pp. 391-400, 2009, ACM, 978-1-60558-798-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
control flow obfuscation, opaque predicate, information flow tracking, control speculation |
12 | Ajay Surendranath, Geetika Sharma |
Using image-based modeling for exporting 3D content from Second Life. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VRCAI ![In: Proceedings of the 8th International Conference on Virtual Reality Continuum and its Applications in Industry, VRCAI 2009, Yokohama, Japan, December 14-15, 2009, pp. 325-329, 2009, ACM, 978-1-60558-912-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
3D modeling from images, synthetic views, image-based modeling |
12 | Marco Furini |
Digital audiobook: from passive to active pursuit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 40(1), pp. 23-39, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Entertainment applications, Interactive applications |
12 | Daniel E. Geer Jr., Daniel G. Conway |
Type II Reverse Engineering [For Good Measure]. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 6(5), pp. 86-87, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Lino Coria-Mendoza, Mark R. Pickering, Panos Nasiopoulos, Rabab K. Ward |
A Video Watermarking Scheme Based on the Dual-Tree Complex Wavelet Transform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 3(3), pp. 466-474, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Mikhail J. Atallah, Eric Bryant, John T. Korb, John R. Rice |
Binding software to specific native hardware in a VM environment: the puf challenge and opportunity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VMSec ![In: Proceedings of the 1st ACM Workshop on Virtual Machine Security, VMSec 2008, Alexandria, VA, USA, October 27, 2008, pp. 45-48, 2008, ACM, 978-1-60558-298-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
anti-tamper, binding software to hardware, virtualization, software protection, physically unclonable functions |
12 | Sun K. Yoo, Jun Choe, Do Yoon Kim |
Agent Based Architecture for Secure Access from Multiple Hospitals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIS-ICIS ![In: 7th IEEE/ACIS International Conference on Computer and Information Science, IEEE/ACIS ICIS 2008, 14-16 May 2008, Portland, Oregon, USA, pp. 255-258, 2008, IEEE Computer Society, 978-0-7695-3131-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Integrated Access Control, Web Service, RBAC, XML Security |
12 | Yingjie Xia, Guanghua Song, Yao Zheng, Mingzhe Zhu |
R2P: A Peer-to-Peer Transfer System Based on Role and Reputation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WKDD ![In: Proceedings of the International Workshop on Knowledge Discovery and Data Mining, WKDD 2008, Adelaide, Australia, 23-24 January 2008, pp. 136-141, 2008, IEEE Computer Society, 0-7695-3090-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Masaki Nakanishi |
An FPGA Configuration Scheme for Bitstream Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARC ![In: Reconfigurable Computing: Architectures, Tools and Applications, 4th International Workshop, ARC 2008, London, UK, March 26-28, 2008. Proceedings, pp. 326-331, 2008, Springer, 978-3-540-78609-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
FPGA configuration, bitstream protection, bitstream encryption, bitstream authentication |
12 | Ingemar J. Cox |
Watermarking, steganography and content forensics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 10th workshop on Multimedia & Security, MM&Sec 2008, Oxford, UK, September 22-23, 2008, pp. 1-2, 2008, ACM, 978-1-60558-058-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
content forensics, steganography, digital watermarking, data hiding, steganalysis |
12 | Anil Yekkala, C. E. Veni Madhavan |
Bit Domain Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIVS ![In: Advanced Concepts for Intelligent Vision Systems, 10th International Conference, ACIVS 2008, Juan-les-Pins, France, October 20-24, 2008. Proceedings, pp. 45-56, 2008, Springer, 978-3-540-88457-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Yousra Alkabani, Farinaz Koushanfar, Negar Kiyavash, Miodrag Potkonjak |
Trusted Integrated Circuits: A Nondestructive Hidden Characteristics Extraction Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers, pp. 102-117, 2008, Springer, 978-3-540-88960-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Mina Deng, Bart Preneel |
On Secure and Anonymous Buyer-Seller Watermarking Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIW ![In: Third International Conference on Internet and Web Applications and Services, ICIW 2008, 8-13 June 2008, Athens, Greece, pp. 524-529, 2008, IEEE Computer Society, 978-0-7695-3163-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
watermarking protocol, multimedia, e-commerce, security and privacy |
12 | Maura B. Paterson |
Sliding-window dynamic frameproof codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 42(2), pp. 195-212, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
05B30, AMS Classifications 94A62 |
12 | David Sohn |
Understanding DRM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Queue ![In: ACM Queue 5(7), pp. 32-39, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Darko Kirovski, Fabien A. P. Petitcolas, Zeph Landau |
The Replacement Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Speech Audio Process. ![In: IEEE Trans. Speech Audio Process. 15(6), pp. 1922-1931, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Nimmi Rangaswamy |
Regulating India's Digital Public Cultures: A Grey or Differently Regulated Area. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (11) ![In: Usability and Internationalization. Global and Local User Interfaces, Second International Conference on Usability and Internationalization, UI-HCII 2007, Held as Part of HCI International 2007, Beijing, China, July 22-27, 2007, Proceedings, Part II, pp. 183-192, 2007, Springer, 978-3-540-73288-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Kristleifur Daðason, Herwig Lejsek, Friðrik Heiðar Ásmundsson, Björn Þór Jónsson 0001, Laurent Amsaleg |
Videntifier: identifying pirated videos in real-time. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia ![In: Proceedings of the 15th International Conference on Multimedia 2007, Augsburg, Germany, September 24-29, 2007, pp. 471-472, 2007, ACM, 978-1-59593-702-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
nv-tree, video retrieval, copyright protection |
12 | Che-Jen Hsieh, Wei-Cheng Liu, Jung-Shian Li |
An Efficient Packet-level JPEG Forensic Data Collection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FGCN (2) ![In: Future Generation Communication and Networking, FGCN 2007, Ramada Plaza Jeju, Jeju-Island, Korea, December 6-8, 2007, Proceedings, pp. 108-113, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Yao-Jen Chang, Chiu-Hui Chen |
Experiences of Adopting In-class Blogs in the Teaching of Hands-on Computer Laboratory Courses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALT ![In: Proceedings of the 7th IEEE International Conference on Advanced Learning Technologies, ICALT 2007, Niigata, Japan, July 18-20, 2007, pp. 447-448, 2007, IEEE Computer Society, 978-0-7695-2916-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Hanane H. Mirza, Alexander Adli, Hien D. Thai, Yasunori Nagata, Zensho Nakao |
Audio Watermarking Based on the Psychoacoustic Model and Modulated Complex Lapped Transform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (2) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 11th International Conference, KES 2007, XVII Italian Workshop on Neural Networks, Vietri sul Mare, Italy, September 12-14, 2007. Proceedings, Part II, pp. 295-302, 2007, Springer, 978-3-540-74826-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Psychoacoustic system, MCLT, Audio watermarking |
12 | Bok-Min Goi, Raphael C.-W. Phan, Hean-Teik Chuah |
Cryptanalysis of Two Non-anonymous Buyer-Seller Watermarking Protocols for Content Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings, Part I, pp. 951-960, 2007, Springer, 978-3-540-74468-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Security issues in UMS, Authentication in UMS, content protection and DRM, digital watermarking and fingerprinting, protocol |
12 | William Zhu 0001 |
Informed Recognition in Software Watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAISI ![In: Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings, pp. 257-261, 2007, Springer, 978-3-540-71548-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Cheng Yang, Jianbo Liu, Aina Sui, Yongbin Wang |
A Digital Rights Management Architecture for Multimedia in P2P. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAKDD Workshops ![In: Emerging Technologies in Knowledge Discovery and Data Mining, PAKDD 2007, International Workshops, Nanjing, China, May 22-25, 2007, Revised Selected Papers, pp. 664-672, 2007, Springer, 978-3-540-77016-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Identity Authentication, Digital Watermarking, Peer-to-Peer (P2P), Public Key Infrastructure (PKI), Digital Rights Management (DRM) |
12 | Noam Kogan, Yuval Shavitt, Avishai Wool |
A practical revocation scheme for broadcast encryption using smartcards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 9(3), pp. 325-351, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
smart cards, Broadcast encryption |
12 | Justin Zobel, Timothy C. Hoad |
Detection of video sequences using compact signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. ![In: ACM Trans. Inf. Syst. 24(1), pp. 1-50, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Video similarity detection, dynamic programming, local alignment |
12 | Shu-Fen Tu, Ching-Sheng Hsu |
A DCT-based ownership identification method with gray-level and colorful signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pattern Anal. Appl. ![In: Pattern Anal. Appl. 9(2-3), pp. 229-242, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Ownership identification, Copyright protection scheme, Discrete cosine transform |
12 | Yu-Lun Huang, F. S. Ho, Hsin-Yi Tsai, H. M. Kao |
A control flow obfuscation method to discourage malicious tampering of software codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006, pp. 362, 2006, ACM, 1-59593-272-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
control flow obfuscation, reverse engineering, tamper-resistance, intellectual property protection, software obfuscation |