Search dblp for Publications

export results for "toc:db/conf/ccs/ccsdrm2002.bht:"

 download as .bib file

@proceedings{DBLP:conf/ccs/2002drm,
  editor       = {Joan Feigenbaum},
  title        = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop,
                  {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2696},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/b11725},
  doi          = {10.1007/B11725},
  isbn         = {3-540-40410-4},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2002drm.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BiddleEPW02,
  author       = {Peter Biddle and
                  Paul England and
                  Marcus Peinado and
                  Bryan Willman},
  editor       = {Joan Feigenbaum},
  title        = {The Darknet and the Future of Content Protection},
  booktitle    = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop,
                  {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2696},
  pages        = {155--176},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-44993-5\_10},
  doi          = {10.1007/978-3-540-44993-5\_10},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BiddleEPW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BoldyrevaJ02,
  author       = {Alexandra Boldyreva and
                  Markus Jakobsson},
  editor       = {Joan Feigenbaum},
  title        = {Theft-Protected Proprietary Certificates},
  booktitle    = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop,
                  {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2696},
  pages        = {208--220},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-44993-5\_13},
  doi          = {10.1007/978-3-540-44993-5\_13},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BoldyrevaJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChowEJO02,
  author       = {Stanley Chow and
                  Philip A. Eisen and
                  Harold Johnson and
                  Paul C. van Oorschot},
  editor       = {Joan Feigenbaum},
  title        = {A White-Box {DES} Implementation for {DRM} Applications},
  booktitle    = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop,
                  {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2696},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-44993-5\_1},
  doi          = {10.1007/978-3-540-44993-5\_1},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ChowEJO02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DodisF02,
  author       = {Yevgeniy Dodis and
                  Nelly Fazio},
  editor       = {Joan Feigenbaum},
  title        = {Public Key Broadcast Encryption for Stateless Receivers},
  booktitle    = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop,
                  {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2696},
  pages        = {61--80},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-44993-5\_5},
  doi          = {10.1007/978-3-540-44993-5\_5},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/DodisF02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Halderman02,
  author       = {John A. Halderman},
  editor       = {Joan Feigenbaum},
  title        = {Evaluating New Copy-Prevention Techniques for Audio CDs},
  booktitle    = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop,
                  {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2696},
  pages        = {101--117},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-44993-5\_7},
  doi          = {10.1007/978-3-540-44993-5\_7},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Halderman02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JacobBF02,
  author       = {Matthias Jacob and
                  Dan Boneh and
                  Edward W. Felten},
  editor       = {Joan Feigenbaum},
  title        = {Attacking an Obfuscated Cipher by Injecting Faults},
  booktitle    = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop,
                  {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2696},
  pages        = {16--31},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-44993-5\_2},
  doi          = {10.1007/978-3-540-44993-5\_2},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/JacobBF02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JohnsonS02,
  author       = {Robert Johnson and
                  Jessica Staddon},
  editor       = {Joan Feigenbaum},
  title        = {{FAIR:} Fair Audience InfeRence},
  booktitle    = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop,
                  {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2696},
  pages        = {190--207},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-44993-5\_12},
  doi          = {10.1007/978-3-540-44993-5\_12},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/JohnsonS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KiayiasY02,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  editor       = {Joan Feigenbaum},
  title        = {Breaking and Repairing Asymmetric Public-Key Traitor Tracing},
  booktitle    = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop,
                  {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2696},
  pages        = {32--50},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-44993-5\_3},
  doi          = {10.1007/978-3-540-44993-5\_3},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/KiayiasY02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KirovskiP02,
  author       = {Darko Kirovski and
                  Fabien A. P. Petitcolas},
  editor       = {Joan Feigenbaum},
  title        = {Replacement Attack on Arbitrary Watermarking Systems},
  booktitle    = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop,
                  {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2696},
  pages        = {177--189},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-44993-5\_11},
  doi          = {10.1007/978-3-540-44993-5\_11},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/KirovskiP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KorbaK02,
  author       = {Larry Korba and
                  Steve Kenny},
  editor       = {Joan Feigenbaum},
  title        = {Towards Meeting the Privacy Challenge: Adapting {DRM}},
  booktitle    = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop,
                  {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2696},
  pages        = {118--136},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-44993-5\_8},
  doi          = {10.1007/978-3-540-44993-5\_8},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/KorbaK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LaMacchia02,
  author       = {Brian A. LaMacchia},
  editor       = {Joan Feigenbaum},
  title        = {Key Challenges in {DRM:} An Industry Perspective},
  booktitle    = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop,
                  {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2696},
  pages        = {51--60},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-44993-5\_4},
  doi          = {10.1007/978-3-540-44993-5\_4},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/LaMacchia02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MulliganB02,
  author       = {Deirdre K. Mulligan and
                  Aaron J. Burstein},
  editor       = {Joan Feigenbaum},
  title        = {Implementing Copyright Limitations in Rights Expression Languages},
  booktitle    = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop,
                  {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2696},
  pages        = {137--154},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-44993-5\_9},
  doi          = {10.1007/978-3-540-44993-5\_9},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/MulliganB02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Safavi-NainiW02,
  author       = {Reihaneh Safavi{-}Naini and
                  Yejing Wang},
  editor       = {Joan Feigenbaum},
  title        = {Traitor Tracing for Shortened and Corrupted Fingerprints},
  booktitle    = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop,
                  {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2696},
  pages        = {81--100},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-44993-5\_6},
  doi          = {10.1007/978-3-540-44993-5\_6},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Safavi-NainiW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics