The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for piracy with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1977-1990 (16) 1991-1998 (19) 1999-2000 (20) 2001-2002 (23) 2003 (32) 2004 (38) 2005 (46) 2006 (42) 2007 (36) 2008 (32) 2009 (30) 2010 (28) 2011 (21) 2012 (40) 2013 (26) 2014 (32) 2015 (22) 2016 (19) 2017 (20) 2018 (23) 2019 (18) 2020 (18) 2021 (17) 2022 (34) 2023-2024 (17)
Publication types (Num. hits)
article(356) incollection(6) inproceedings(306) phdthesis(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 254 occurrences of 151 keywords

Results
Found 669 publication records. Showing 669 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
12Rudolf Ahlswede, Ning Cai 0001 Codes with the Identifiable Parent Property and the Multiple-Access Channel. Search on Bibsonomy GTIT-C The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Yizhou Ma, Chang-hui Choe, Moon Ho Lee A Class of Traceability Codes with an Efficient Tracing Algorithm. Search on Bibsonomy ICSEA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Traceability Codes, List Decoding Algorithm, Reed-Solomon codes, Traitor Tracing
12Mila Dalla Preda, Matias Madou, Koen De Bosschere, Roberto Giacobazzi Opaque Predicates Detection by Abstract Interpretation. Search on Bibsonomy AMAST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Ickjai Lee, Hossein Ghodosi Privacy and Security Enhanced Offline Oblivious Transfer for Massive Data Distribution. Search on Bibsonomy WISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12WenYuan Jen, Weiping Chang, Shihchieh Chou Cybercrime in Taiwan - An Analysis of Suspect Records. Search on Bibsonomy WISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Zoltán Nochta, Thorsten Staake, Elgar Fleisch Product Specific Security Features Based on RFID Technology. Search on Bibsonomy SAINT Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Marc Fetscherin Economics of online music and consumer behavior. Search on Bibsonomy ICEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF online music, digital rights management, consumer behavior
12Chih-Chieh Liu, Yu-Feng Kuo, Chun-Hsiang Huang, Ja-Ling Wu A Colorization Based Animation Broadcast System with Traitor Tracing Capability. Search on Bibsonomy IWDW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF animation broadcasting, colorization, traitor tracing
12William Zhu 0001, Clark D. Thomborson Extraction in software watermarking. Search on Bibsonomy MM&Sec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF embed, security, graph, extract, software watermark, interference graph
12Jie Guo, Yingjiu Li, Robert H. Deng, Kefei Chen Rights Protection for Data Cubes. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Hongxia Jin, Jeffery Lotspiech Hybrid Traitor Tracing. Search on Bibsonomy ICME The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Josep Pegueroles, Marcel Fernandez, Francisco Rico-Novella, Miguel Soriano A Practical Solution for Distribution Rights Protection in Multicast Environments. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Qutaiba Albluwi, Ibrahim Kamel Watermarking Essential Data Structures for Copyright Protection. Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Yang Bo, Wang Qin An efficient traitor tracing scheme based on MDS code. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF traitor tracing, collusion-resistant, MDS code
12Hongxia Jin Privacy, traceability, and anonymity for content protection. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF anonymous trust, security, privacy, tracing, content protection
12Milind Engedy, Munaga V. N. K. Prasad, Ashutosh Saxena A Robust Wavelet Based Digital Watermarking Scheme Using Chaotic Mixing. Search on Bibsonomy ICDIM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Tamir Tassa Low Bandwidth Dynamic Traitor Tracing Schemes. Search on Bibsonomy J. Cryptol. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Watermarking, Fingerprinting, On-line algorithms, Broadcast encryption, Traitor tracing, Binary codes, Pay-TV
12Kemal Altinkemer, Junwei Guan, Aysegül Sahin Online software distribution without enforcing copy protection as a strategic weapon. Search on Bibsonomy Inf. Syst. E Bus. Manag. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti Yung Scalable public-key tracing and revoking. Search on Bibsonomy Distributed Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Digital Content Distribution, Scalability, Multicast, Broadcast Encryption, Traitor Tracing
12Jun Yang 0002, Lan Gao, Youtao Zhang Improving Memory Encryption Performance in Secure Processors. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2005 DBLP  DOI  BibTeX  RDF hardware/software protection, security and protection, Memory design
12Thorsten Staake, Frédéric Thiesse, Elgar Fleisch Extending the EPC network: the potential of RFID in anti-counterfeiting. Search on Bibsonomy SAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF track & trace, authentication, RFID, counterfeiting
12John Patrick McGregor, Yiqun Lisa Yin, Ruby B. Lee A Traitor Tracing Scheme Based on RSA for Fast Decryption. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Silvia Llorente, Jaime Delgado, Eva Rodríguez, Rubén Barrio, Isabella Longo, Franco Bixio Generation of Standardised Rights Expressions from Contracts: An Ontology Approach? Search on Bibsonomy OTM Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Stefan Savage Scalable internet threat monitoring. Search on Bibsonomy WORM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Jun Sang, Mohammad S. Alam A Neural Network Based Lossless Digital Image Watermarking in the Spatial Domain. Search on Bibsonomy ISNN (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Michael Vrable, Justin Ma, Jay Chen, David Moore 0001, Erik Vandekieft, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage Scalability, fidelity, and containment in the potemkin virtual honeyfarm. Search on Bibsonomy SOSP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF honeyfarm, malware, honeypot, virtual machine monitor, copy-on-write
12Xiaoming Jin, Zhihao Zhang, Jianmin Wang 0001, Deyi Li Watermarking Spatial Trajectory Database. Search on Bibsonomy DASFAA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF spatial trajectory, Digital watermarks, database security
12Hongxia Jin, Jeffery Lotspiech Flexible Traitor Tracing for Anonymous Attacks. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Balaji Venkatachalam Software Watermarking as a Proof of Identity: A Study of Zero Knowledge Proof Based Software Watermarking. Search on Bibsonomy IWDW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Matias Madou, Bertrand Anckaert, Patrick Moseley, Saumya K. Debray, Bjorn De Sutter, Koen De Bosschere Software Protection Through Dynamic Code Mutation. Search on Bibsonomy WISA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Noburou Taniguchi, Koji Chida, Osamu Shionoiri, Atsushi Kanai DECIDE: a scheme for decentralized identity escrow. Search on Bibsonomy Digital Identity Management The full citation details ... 2005 DBLP  DOI  BibTeX  RDF fair blind signature, online discussion community, school networking, whistleblowing, trust, anonymity, identity, pseudonymity, identity escrow
12Marcel Fernandez, Miguel Soriano, Josep Cotrina Navau Tracing Traitors by Guessing Secrets. The q-Ary Case. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12William Zhu 0001, Clark D. Thomborson Algorithms to Watermark Software Through Register Allocation. Search on Bibsonomy DRMTICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Marcel Fernandez, Miguel Soriano, Josep Cotrina Navau Practical Scenarios for the Van Trung-Martirosyan Codes. Search on Bibsonomy ICCSA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12William Zhu 0001, Clark D. Thomborson On the QP Algorithm in Software Watermarking. Search on Bibsonomy ISI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Vural Ünlü, Thomas Hess The Access-Usage-Control-Matrix: A Heuristic Tool for Implementing a Selected Level of Technical Content Protection. Search on Bibsonomy CEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Tran van Trung, Sosina Martirosyan On a Class of Traceability Codes. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF traceability code, q-ary code, mutually orthogonal latin squares
12Newton Lee Welcome. Search on Bibsonomy Comput. Entertain. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12David Koller, Michael Turitzin, Marc Levoy, Marco Tarini, Giuseppe Croccia, Paolo Cignoni, Roberto Scopigno Protected interactive 3D graphics via remote rendering. Search on Bibsonomy ACM Trans. Graph. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security, 3D models, digital rights management, remote rendering
12Joseph Zambreno, Rahul Simha, Alok N. Choudhary Addressing application integrity attacks using a reconfigurable architecture. Search on Bibsonomy FPGA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Silvia Llorente, Eva Rodríguez, Jaime Delgado Workflow Description of Digital Rights Management Systems. Search on Bibsonomy OTM Workshops The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12William Ku, Chi-Hung Chi Survey on the Technological Aspects of Digital Rights Management. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Sakuna Vanichvisuttikul, Chamnong Jungthirapanich The Assessment of E-Commerce Awareness on Highly Valuable Traditional Products in Thailand. Search on Bibsonomy EEE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Marcel Fernandez, Miguel Soriano Identification Algorithms for Sequential Traitor Tracing. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Magali Dubosson-Torbay, Yves Pigneur, Jean-Claude Usunier Business Models for Music Distribution after the P2P Revolution. Search on Bibsonomy WEDELMUSIC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum Support for multi-level security policies in DRM architectures. Search on Bibsonomy NSPW The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Ahmet M. Eskicioglu Protecting Intellectual Property in Digital Multimedia Networks. Search on Bibsonomy Computer The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
12Christian S. Collberg, Ginger Myles, Andrew Huntwork Sandmark--A Tool for Software Protection Research. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
12Rakesh Agrawal 0001, Peter J. Haas, Jerry Kiernan Watermarking relational data: framework, algorithms and analysis. Search on Bibsonomy VLDB J. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Database, Watermarking, Steganography, Information hiding
12Cullen Linn, Saumya K. Debray Obfuscation of executable code to improve resistance to static disassembly. Search on Bibsonomy CCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF disassembly, code obfuscation
12Xiangyu Zhang 0001, Rajiv Gupta 0001 Hiding Program Slices for Software Security. Search on Bibsonomy CGO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
12Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti Yung Scalable public-key tracing and revoking. Search on Bibsonomy PODC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Digital Content Distribution, Scalability, Multicast, Broadcast Encryption, Traitor Tracing
12Noam Kogan, Yuval Shavitt, Avishai Wool A Practical Revocation Scheme for Broadcast Encryption Using Smart Cards. Search on Bibsonomy S&P The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
12Christian S. Collberg, Clark D. Thomborson Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF watermarking, Obfuscation, intellectual property protection, tamper-proofing
12Darko Kirovski, Fabien A. P. Petitcolas Replacement Attack on Arbitrary Watermarking Systems. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
12Brian K. Hart Electronic delivery of software: implementation of a robust, effective solution. Search on Bibsonomy SIGUCCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF web-enabled applications, software, development, licensing, delivery
12Dylan Carline, Paul Coulton Internet Authentication of LUT-Based FPGA Configuration Files. Search on Bibsonomy IPDPS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Configuration Files, FPGA, Authentication, Bitstream
12Scott Moskowitz What is Acceptable Quality in the Application of Digital Watermarking: Trade-offs of Security, Robustness and Quality. Search on Bibsonomy ITCC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
12Tadayoshi Kohno, Mark McGovern On the Global Content PMI: Improved Copy-Protected Internet Content Distribution. Search on Bibsonomy Financial Cryptography The full citation details ... 2001 DBLP  BibTeX  RDF risk management, content distribution, copy-protection, PMI
12Bill G. Horne, Benny Pinkas, Tomas Sander Escrow services and incentives in peer-to-peer networks. Search on Bibsonomy EC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
12Jill Gerhardt-Powals, Matthew H. Powals Distance education: law attempts to catch up with technology (battle between copyright owners and academics). Search on Bibsonomy SIGCSE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
12Sung-Min Lee 0006, Hyung-Woo Lee, Tai-Yun Kim A Secure Electronic Software Distribution (ESD) Protocol Based on PKC. Search on Bibsonomy EC-Web The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
12Juan A. Garay, Jessica Staddon, Avishai Wool Long-Lived Broadcast Encryption. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
12Tomas Sander, Christian F. Tschudin On Software Protection via Function Hiding. Search on Bibsonomy Information Hiding The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
12Karl Dakin Do You Know What Your License Allows? Search on Bibsonomy IEEE Softw. The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
12Galen B. Crow Defining educational policy on software usage in the light of copyright law. Search on Bibsonomy SIGCSE The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
12Jean-Jacques Quisquater, André Bouckaert Zero-Knowledge Procedures for Confidential Access to Medical Records (Extended Summary). Search on Bibsonomy EUROCRYPT The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
12Mark B. Johnson You cannot lead a horse to water: taking charge of microcomputer support. Search on Bibsonomy SIGUCCS The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
12Ingrid Schaumüller-Bichl, Ernst Piller A Method of Software Protection Based on the Use of Smart Cards and Cryptographic Techniques. Search on Bibsonomy EUROCRYPT The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
Displaying result #601 - #669 of 669 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license