Login / Signup
Digital Rights Management Workshop
2001
2005
2007
2011
2001
2011
Keyphrases
Publications
2011
Marc Joye
,
Tancrède Lepoint
Traitor tracing schemes for protected software implementations.
Digital Rights Management Workshop
(2011)
Marcel Schäfer
,
Waldemar Berchtold
,
Martin Steinebach
Fast and adaptive tracing strategies for 3-secure fingerprint watermarking codes.
Digital Rights Management Workshop
(2011)
Mohammad Jafari
,
Reihaneh Safavi-Naini
,
Nicholas Paul Sheppard
A rights management approach to protection of privacy in a cloud of electronic health records.
Digital Rights Management Workshop
(2011)
Darko Kirovski
,
Christopher Meek
Tunneled TLS for multi-factor authentication.
Digital Rights Management Workshop
(2011)
Proceedings of the 11th ACM Workshop on Digital Rights Management, Chicago, Illinois, USA, October 21, 2011
Digital Rights Management Workshop
(2011)
Bruce E. Boyden
Is DRM working?: how could we tell?
Digital Rights Management Workshop
(2011)
Sheng Wei
,
Farinaz Koushanfar
,
Miodrag Potkonjak
Integrated circuit digital rights management techniques using physical level characterization.
Digital Rights Management Workshop
(2011)
Christopher C. Lamb
,
Pramod A. Jamkhedkar
,
Mathew P. Bohnsack
,
Viswanath Nandina
,
Gregory L. Heileman
A domain specific language for usage management.
Digital Rights Management Workshop
(2011)
2010
Pramod A. Jamkhedkar
,
Gregory L. Heileman
,
Christopher C. Lamb
An interoperable usage management framework.
Digital Rights Management Workshop
(2010)
Moni Naor
The privacy of tracing traitors.
Digital Rights Management Workshop
(2010)
Jan Cappaert
,
Bart Preneel
A general model for hiding control flow.
Digital Rights Management Workshop
(2010)
Kunihiko Fujita
,
Yasuyuki Tsukada
An analysis of interoperability between licenses.
Digital Rights Management Workshop
(2010)
Ee-Chien Chang
,
Chengfang Fang
,
Jia Xu
A chameleon encryption scheme resistant to known-plaintext attack.
Digital Rights Management Workshop
(2010)
Eric Diehl
,
Arnaud Robert
An introduction to interoperable digital rights locker.
Digital Rights Management Workshop
(2010)
Dan Boneh
,
Aggelos Kiayias
,
Hart William Montgomery
Robust fingerprinting codes: a near optimal construction.
Digital Rights Management Workshop
(2010)
Pascal Junod
,
Alexandre Karlov
An efficient public-key attribute-based broadcast encryption scheme allowing arbitrary access policies.
Digital Rights Management Workshop
(2010)
Mohammad Jafari
,
Reihaneh Safavi-Naini
,
Chad Saunders
,
Nicholas Paul Sheppard
Using digital rights management for securing data in a medical research environment.
Digital Rights Management Workshop
(2010)
Song Luo
,
Jian-bin Hu
,
Zhong Chen
New construction of identity-based proxy re-encryption.
Digital Rights Management Workshop
(2010)
Proceedings of the 10th ACM Workshop on Digital Rights Management, Chicago, Illinois, USA, October 4, 2010
Digital Rights Management Workshop
(2010)
Vaibhav Gowadia
,
Enrico Scalavino
,
Emil C. Lupu
,
Dmitry Starostin
,
Alexey Orlov
Secure cross-domain data sharing architecture for crisis management.
Digital Rights Management Workshop
(2010)
2009
Srivatsan Narayanan
,
Ananth Raghunathan
,
Ramarathnam Venkatesan
Obfuscating straight line arithmetic programs.
Digital Rights Management Workshop
(2009)
Juan Ramón Troncoso-Pastoriza
,
Pedro Comesaña
,
Luis Pérez-Freire
,
Fernando Pérez-González
Videosurveillance and privacy: covering the two sides of the mirror with DRM.
Digital Rights Management Workshop
(2009)
Nicholas Paul Sheppard
,
Reihaneh Safavi-Naini
On the operational semantics of rights expression languages.
Digital Rights Management Workshop
(2009)
Proceedings of the 9th ACM Workshop on Digital Rights Management, Chicago, Illinois, USA, November 9, 2009
Digital Rights Management Workshop
(2009)
Jeffrey B. Lotspiech
Broadcast encryption versus public key cryptography in content protection systems.
Digital Rights Management Workshop
(2009)
Changjiang Zhang
,
Jianmin Wang
,
Clark D. Thomborson
,
Chaokun Wang
,
Christian S. Collberg
A semi-dynamic multiple watermarking schemefor java applications.
Digital Rights Management Workshop
(2009)
Davide Alessio
,
Marc Joye
A simple construction for public-key encryption with revocable anonymity: the honest-sender case.
Digital Rights Management Workshop
(2009)
Amit Sachan
,
Sabu Emmanuel
,
Mohan S. Kankanhalli
Efficient license validation in MPML DRM architecture.
Digital Rights Management Workshop
(2009)
Aggelos Kiayias
,
Serdar Pehlivanoglu
On the security of a public-key traitor tracing scheme with sublinear ciphertext size.
Digital Rights Management Workshop
(2009)
Sye Loong Keoh
,
Koen Vrielink
An implementation experience of domain management in marlin.
Digital Rights Management Workshop
(2009)