![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "toc:db/conf/ccs/ccsdrm2002.bht:"
@proceedings{DBLP:conf/ccs/2002drm, editor = {Joan Feigenbaum}, title = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop, {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2696}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/b11725}, doi = {10.1007/B11725}, isbn = {3-540-40410-4}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2002drm.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BiddleEPW02, author = {Peter Biddle and Paul England and Marcus Peinado and Bryan Willman}, editor = {Joan Feigenbaum}, title = {The Darknet and the Future of Content Protection}, booktitle = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop, {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2696}, pages = {155--176}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-44993-5\_10}, doi = {10.1007/978-3-540-44993-5\_10}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BiddleEPW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BoldyrevaJ02, author = {Alexandra Boldyreva and Markus Jakobsson}, editor = {Joan Feigenbaum}, title = {Theft-Protected Proprietary Certificates}, booktitle = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop, {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2696}, pages = {208--220}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-44993-5\_13}, doi = {10.1007/978-3-540-44993-5\_13}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BoldyrevaJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChowEJO02, author = {Stanley Chow and Philip A. Eisen and Harold Johnson and Paul C. van Oorschot}, editor = {Joan Feigenbaum}, title = {A White-Box {DES} Implementation for {DRM} Applications}, booktitle = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop, {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2696}, pages = {1--15}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-44993-5\_1}, doi = {10.1007/978-3-540-44993-5\_1}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ChowEJO02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DodisF02, author = {Yevgeniy Dodis and Nelly Fazio}, editor = {Joan Feigenbaum}, title = {Public Key Broadcast Encryption for Stateless Receivers}, booktitle = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop, {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2696}, pages = {61--80}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-44993-5\_5}, doi = {10.1007/978-3-540-44993-5\_5}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/DodisF02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Halderman02, author = {John A. Halderman}, editor = {Joan Feigenbaum}, title = {Evaluating New Copy-Prevention Techniques for Audio CDs}, booktitle = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop, {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2696}, pages = {101--117}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-44993-5\_7}, doi = {10.1007/978-3-540-44993-5\_7}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Halderman02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JacobBF02, author = {Matthias Jacob and Dan Boneh and Edward W. Felten}, editor = {Joan Feigenbaum}, title = {Attacking an Obfuscated Cipher by Injecting Faults}, booktitle = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop, {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2696}, pages = {16--31}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-44993-5\_2}, doi = {10.1007/978-3-540-44993-5\_2}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/JacobBF02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JohnsonS02, author = {Robert Johnson and Jessica Staddon}, editor = {Joan Feigenbaum}, title = {{FAIR:} Fair Audience InfeRence}, booktitle = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop, {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2696}, pages = {190--207}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-44993-5\_12}, doi = {10.1007/978-3-540-44993-5\_12}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/JohnsonS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KiayiasY02, author = {Aggelos Kiayias and Moti Yung}, editor = {Joan Feigenbaum}, title = {Breaking and Repairing Asymmetric Public-Key Traitor Tracing}, booktitle = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop, {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2696}, pages = {32--50}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-44993-5\_3}, doi = {10.1007/978-3-540-44993-5\_3}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/KiayiasY02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KirovskiP02, author = {Darko Kirovski and Fabien A. P. Petitcolas}, editor = {Joan Feigenbaum}, title = {Replacement Attack on Arbitrary Watermarking Systems}, booktitle = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop, {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2696}, pages = {177--189}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-44993-5\_11}, doi = {10.1007/978-3-540-44993-5\_11}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/KirovskiP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KorbaK02, author = {Larry Korba and Steve Kenny}, editor = {Joan Feigenbaum}, title = {Towards Meeting the Privacy Challenge: Adapting {DRM}}, booktitle = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop, {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2696}, pages = {118--136}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-44993-5\_8}, doi = {10.1007/978-3-540-44993-5\_8}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/KorbaK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LaMacchia02, author = {Brian A. LaMacchia}, editor = {Joan Feigenbaum}, title = {Key Challenges in {DRM:} An Industry Perspective}, booktitle = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop, {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2696}, pages = {51--60}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-44993-5\_4}, doi = {10.1007/978-3-540-44993-5\_4}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LaMacchia02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MulliganB02, author = {Deirdre K. Mulligan and Aaron J. Burstein}, editor = {Joan Feigenbaum}, title = {Implementing Copyright Limitations in Rights Expression Languages}, booktitle = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop, {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2696}, pages = {137--154}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-44993-5\_9}, doi = {10.1007/978-3-540-44993-5\_9}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MulliganB02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Safavi-NainiW02, author = {Reihaneh Safavi{-}Naini and Yejing Wang}, editor = {Joan Feigenbaum}, title = {Traitor Tracing for Shortened and Corrupted Fingerprints}, booktitle = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop, {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2696}, pages = {81--100}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-44993-5\_6}, doi = {10.1007/978-3-540-44993-5\_6}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Safavi-NainiW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.