𝔖 Bobbio Scriptorium
✦   LIBER   ✦

[Lecture Notes in Computer Science] Security and Privacy in Digital Rights Management Volume 2320 || Collusion Secure q-ary Fingerprinting for Perceptual Content

✍ Scribed by Sander, Tomas


Book ID
120346862
Publisher
Springer Berlin Heidelberg
Year
2002
Tongue
English
Weight
239 KB
Edition
1
Category
Article
ISBN
3540478701

No coin nor oath required. For personal study only.

✦ Synopsis


The ACM Workshop on Security and Privacy in Digital Rights Management is the ?rst scienti?c workshop with refereed proceedings devoted solely to this topic. The workshop was held in conjunction with the Eighth ACM Conference on Computer and Communications Security (CCS-8) in Philadelphia, USA on November 5, 2001. Digital Rights Management technology is meant to provide end-to-end so- tions for the digital distribution of electronic goods. Sound security and privacy features are among the key requirements for such systems. Fifty papers were submitted to the workshop, quite a success for a ?rst-time workshop. From these 50 submissions, the program committee selected 15 papers for presentation at the workshop. They cover a broad area of relevant techniques, including cryptography, system architecture, and cryptanalysis of existing DRM systems. Three accepted papers are about software tamper resistance, an area about which few scienti?c articles have been published before. Another paper addresses renewability of security measures. Renewability is another important security technique for DRM systems, and I hope we will see more publications about this in the future. I am particularly glad that three papers cover economic and legal aspects of digital distribution of electronic goods. Technical security measures do not exist in a vacuum and their e?ectiveness interacts in a number of ways with the environment for legal enforcement. Deploying security and an- piracy measures adequately requires furthermore a good understanding of the business models that they are designed to support.


πŸ“œ SIMILAR VOLUMES


[Lecture Notes in Computer Science] Secu
✍ Sander, Tomas πŸ“‚ Article πŸ“… 2002 πŸ› Springer Berlin Heidelberg 🌐 German βš– 563 KB

The Acm Workshop On Security And Privacy In Digital Rights Management Is The ?rst Scienti?c Workshop With Refereed Proceedings Devoted Solely To This Topic. The Workshop Was Held In Conjunction With The Eighth Acm Conference On Computer And Communications Security (ccs-8) In Philadelphia, Usa On Nov

[Lecture Notes in Computer Science] Info
✍ Dawson, E. P.; Clark, A.; Boyd, Colin πŸ“‚ Article πŸ“… 2000 πŸ› Springer Berlin Heidelberg βš– 183 KB

This book constitutes the refereed proceedings of the 5th Australasian Conference on Information Security and Privacy, ACISP 2000, held in Brisbane, QLD, Australia, in July 2000.The 37 revised full papers presented together with two invited contributions were carefully reviewed and selected from a t

[Lecture Notes in Computer Science] Digi
✍ Safavi-Naini, Reihaneh; Yung, Moti πŸ“‚ Article πŸ“… 2006 πŸ› Springer Berlin Heidelberg 🌐 English βš– 394 KB

This book constitutes the thoroughly refereed post-proceedings of the First International Conference on Digital Rights Management: Technology, Issues, Challenges and Systems, DRMTICS 2005, held in Sydney, Australia, in October/November 2005. Presents 26 carefully reviewed full papers organized in to

[Lecture Notes in Computer Science] Comm
✍ De Decker, Bart; Lapon, Jorn; Naessens, Vincent; Uhl, Andreas πŸ“‚ Article πŸ“… 2011 πŸ› Springer Berlin Heidelberg 🌐 German βš– 501 KB

This Book Constitutes The Refereed Proceedings Of The 12th Ifip Tc 6/tc 11 International Conference On Communications And Multimedia Security, Cms 2010, Held In Ghent, Belgium, In October 2011. The 26 Revised Papers Presented Were Carefully Reviewed And Selected From 52 Submissions. The Papers Are O

[Lecture Notes in Computer Science] Trus
✍ Fischer-HΓΌbner, Simone; Furnell, Stevel; Lambrinoudakis, Costas πŸ“‚ Article πŸ“… 2006 πŸ› Springer Berlin Heidelberg 🌐 English βš– 552 KB

This book constitutes the refereed proceedings of the Third International Conference on Trust and Privacy in Digital Business, TrustBus 2006, held in conjunction with DEXA 2006. The book presents 24 carefully reviewed, revised full papers, organized in topical sections on privacy and identity manage