default search action
Digital Rights Management Workshop 2010: Chicago, Illinois, USA
- Ehab Al-Shaer, Hongxia Jin, Marc Joye:
Proceedings of the 10th ACM Workshop on Digital Rights Management, Chicago, Illinois, USA, October 4, 2010. ACM 2010, ISBN 978-1-4503-0091-9 - Moni Naor:
The privacy of tracing traitors. 1-2
Fingerprinting
- Dan Boneh, Aggelos Kiayias, Hart William Montgomery:
Robust fingerprinting codes: a near optimal construction. 3-12
Cryptography & applications
- Pascal Junod, Alexandre Karlov:
An efficient public-key attribute-based broadcast encryption scheme allowing arbitrary access policies. 13-24 - Ee-Chien Chang, Chengfang Fang, Jia Xu:
A chameleon encryption scheme resistant to known-plaintext attack. 25-34 - Jan Cappaert, Bart Preneel:
A general model for hiding control flow. 35-42
Short papers
- Vaibhav Gowadia, Enrico Scalavino, Emil C. Lupu, Dmitry Starostin, Alexey Orlov:
Secure cross-domain data sharing architecture for crisis management. 43-46 - Song Luo, Jian-bin Hu, Zhong Chen:
New construction of identity-based proxy re-encryption. 47-50 - Eric Diehl, Arnaud Robert:
An introduction to interoperable digital rights locker. 51-54
Rights management
- Mohammad Jafari, Reihaneh Safavi-Naini, Chad Saunders, Nicholas Paul Sheppard:
Using digital rights management for securing data in a medical research environment. 55-60 - Kunihiko Fujita, Yasuyuki Tsukada:
An analysis of interoperability between licenses. 61-72 - Pramod A. Jamkhedkar, Gregory L. Heileman, Chris C. Lamb:
An interoperable usage management framework. 73-88
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.