


default search action
Digital Rights Management Workshop 2010: Chicago, Illinois, USA
- Ehab Al-Shaer, Hongxia Jin, Marc Joye:

Proceedings of the 10th ACM Workshop on Digital Rights Management, Chicago, Illinois, USA, October 4, 2010. ACM 2010, ISBN 978-1-4503-0091-9 - Moni Naor:

The privacy of tracing traitors. 1-2
Fingerprinting
- Dan Boneh, Aggelos Kiayias, Hart William Montgomery:

Robust fingerprinting codes: a near optimal construction. 3-12
Cryptography & applications
- Pascal Junod

, Alexandre Karlov:
An efficient public-key attribute-based broadcast encryption scheme allowing arbitrary access policies. 13-24 - Ee-Chien Chang

, Chengfang Fang, Jia Xu
:
A chameleon encryption scheme resistant to known-plaintext attack. 25-34 - Jan Cappaert, Bart Preneel

:
A general model for hiding control flow. 35-42
Short papers
- Vaibhav Gowadia, Enrico Scalavino, Emil C. Lupu

, Dmitry Starostin, Alexey Orlov:
Secure cross-domain data sharing architecture for crisis management. 43-46 - Song Luo, Jian-bin Hu, Zhong Chen:

New construction of identity-based proxy re-encryption. 47-50 - Eric Diehl, Arnaud Robert:

An introduction to interoperable digital rights locker. 51-54
Rights management
- Mohammad Jafari, Reihaneh Safavi-Naini, Chad Saunders, Nicholas Paul Sheppard:

Using digital rights management for securing data in a medical research environment. 55-60 - Kunihiko Fujita, Yasuyuki Tsukada

:
An analysis of interoperability between licenses. 61-72 - Pramod A. Jamkhedkar, Gregory L. Heileman, Chris C. Lamb:

An interoperable usage management framework. 73-88

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














