Digital Rights Management Technologies, Issues, Challenges and Systems / edited by Reihaneh Safavi-Naini, Moti Yung.

The First International Conference on Digital Rights Management: Technology, Issues, Challenges and Systems (DRMTICS – pronounced ‘dramatics’), took place in Sydney, Australia on 31st October - 2nd November, 2005. It was or- nized by the Centre for Information Security of the University of Wollongon...

Full description

Saved in:
Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Safavi-Naini, Reihaneh (Editor), Yung, Moti (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2006.
Edition:1st ed. 2006.
Series:Security and Cryptology ; 3919
Springer eBook Collection.
Subjects:
Online Access:Click to view e-book
Holy Cross Note:Loaded electronically.
Electronic access restricted to members of the Holy Cross Community.

MARC

LEADER 00000nam a22000005i 4500
001 b3279544
003 MWH
005 20191025132050.0
007 cr nn 008mamaa
008 100301s2006 gw | s |||| 0|eng d
020 |a 9783540359999 
024 7 |a 10.1007/11787952  |2 doi 
035 |a (DE-He213)978-3-540-35999-9 
050 4 |a E-Book 
072 7 |a GPJ  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a GPJ  |2 thema 
072 7 |a URY  |2 thema 
245 1 0 |a Digital Rights Management  |h [electronic resource] :  |b Technologies, Issues, Challenges and Systems /  |c edited by Reihaneh Safavi-Naini, Moti Yung. 
250 |a 1st ed. 2006. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2006. 
300 |a XII, 360 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Security and Cryptology ;  |v 3919 
490 1 |a Springer eBook Collection 
505 0 |a Assurance and Authentication Issues -- A Novel Framework for Multiple Creatorship Protection of Digital Movies -- TIVA: Trusted Integrity Verification Architecture -- Legal and Related Issues -- The Australian Sony PlayStation Case: How Far Will Anti-circumvention Law Reach in the Name of DRM? -- Downloading vs Purchase: Music Industry vs Consumers -- Digital Rights Management: Merging Contract, Copyright and Criminal Law -- Expressing Rights and Management -- User-Attributed Rights in DRM -- AVS-REL—A New Right Expression Language -- A Comparative Study of Specification Models for Autonomic Access Control of Digital Rights -- Watermarking -- The Effect of Fidelity Measure Functions on the Capacity of Digital Watermarks -- A MPEG-2 Video Watermarking Algorithm with Compensation in Bit Stream -- Reversible Semi-fragile Image Authentication Using Zernike Moments and Integer Wavelet Transform -- Software Issues -- Software Tamper Resistance Through Dynamic Program Monitoring -- Call Tree Transformation for Program Obfuscation and Copy Protection -- Algorithms to Watermark Software Through Register Allocation -- Fingerprinting and Image Authentication -- An Efficient Fingerprinting Scheme with Secret Sharing -- Worst-Case Optimal Fingerprinting Codes for Non-threshold Collusion -- Secure Remote Fingerprint Verification Using Dual Watermarks -- Supporting Cryptographic Technology -- Security Weaknesses of Certain Broadcast Encryption Schemes -- A Broadcast Encryption Scheme with Free-Riders but Unconditional Security -- A Novel Broadcast Encryption Based on Time-Bound Cryptographic Keys -- A Vector Approach to Cryptography Implementation -- P2P Issues -- A Novel Privacy and Copyright Protection Enforced Peer-to-Peer Network -- Design of a Secure Digital Contents Delivery System in P2P Networks -- Implementations and Architectures -- Real-Time Implementation of Broadcast Switching System Using Audio Watermark -- Enforcing Regional DRM for Multimedia Broadcasts With and Without Trusted Computing -- A DRM System Supporting What You See Is What You Pay. 
520 |a The First International Conference on Digital Rights Management: Technology, Issues, Challenges and Systems (DRMTICS – pronounced ‘dramatics’), took place in Sydney, Australia on 31st October - 2nd November, 2005. It was or- nized by the Centre for Information Security of the University of Wollongong and in cooperation with the International Association of Cryptologic Research (IACR) and IEEE Computer Society’s Task Force on Information Assurance. DRMTICS isan internationalconferenceseriesthat coversthe areaof digital rights management, including research advancements of an applied and theor- ical nature. The goal is to have a broad coverage of the ?eld and related issues and subjects as the area evolves. Since the Internet and the computing infr- tructure has turned into a marketplace for content where information goods of various kinds are exchanged, this area is expected to grow and be part of the ongoing evolution of the information society. The DRM area is a unique blend of many diverse disciplines that include mathematics and cryptography, legal and social aspects, signal processing and watermarking, game theory, infor- tion theory, software and systems design and business analysis, and DRMTICS attempts to cover as much ground as possible, and to cover new results that will further spur new investigations on the foundations and practices of DRM. We hope that this ?rst conference marks the beginning of a fruitful and useful series of future conferences. This year, the conference received 57 submissions out of which 26 were - cepted for presentation after a rigorous refereeing process. 
590 |a Loaded electronically. 
590 |a Electronic access restricted to members of the Holy Cross Community. 
650 0 |a Data encryption (Computer science). 
650 0 |a Computer communication systems. 
650 0 |a Operating systems (Computers). 
650 0 |a Computers and civilization. 
650 0 |a Computers. 
650 0 |a Law and legislation. 
650 0 |a Management information systems. 
650 0 |a Computer science. 
690 |a Electronic resources (E-books) 
700 1 |a Safavi-Naini, Reihaneh.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Yung, Moti.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
830 0 |a Security and Cryptology ;  |v 3919 
830 0 |a Springer eBook Collection. 
856 4 0 |u https://holycross.idm.oclc.org/login?auth=cas&url=https://doi.org/10.1007/11787952  |3 Click to view e-book  |t 0 
907 |a .b32795440  |b 04-18-22  |c 02-26-20 
998 |a he  |b 02-26-20  |c m  |d @   |e -  |f eng  |g gw   |h 0  |i 1 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC 
950 |a Computer Science (Springer-11645) 
902 |a springer purchased ebooks 
903 |a SEB-COLL 
945 |f  - -   |g 1  |h 0  |j  - -   |k  - -   |l he   |o -  |p $0.00  |q -  |r -  |s b   |t 38  |u 0  |v 0  |w 0  |x 0  |y .i21927066  |z 02-26-20 
999 f f |i e0948fec-1ff9-5c34-bd39-ddb03391bce1  |s e4f71506-5f22-5ddd-94a0-f06a44dfee68  |t 0 
952 f f |p Online  |a College of the Holy Cross  |b Main Campus  |c E-Resources  |d Online  |t 0  |e E-Book  |h Library of Congress classification  |i Elec File