Security and Privacy in Digital Rights Management: ACM CCS-8 Workshop DRM 2001, Philadelphia, PA, USA, November 5, 2001. Revised Papers / Edition 1

Security and Privacy in Digital Rights Management: ACM CCS-8 Workshop DRM 2001, Philadelphia, PA, USA, November 5, 2001. Revised Papers / Edition 1

by Tomas Sander
     
 

This book constitutes the thoroughly refereed post-proceedings of the International Workshop on Security and Privacy in Digital Rights Management, DRM 2001, held during the ACM CCS-8 Conference in Philadelphia, PA, USA, in November 2001.
The 14 revised full papers presented were carefully reviewed and selected from 50 submissions. The papers are organized in

See more details below

Overview

This book constitutes the thoroughly refereed post-proceedings of the International Workshop on Security and Privacy in Digital Rights Management, DRM 2001, held during the ACM CCS-8 Conference in Philadelphia, PA, USA, in November 2001.
The 14 revised full papers presented were carefully reviewed and selected from 50 submissions. The papers are organized in topical sections on renewability, fuzzy hashing, cryptographic techniques and fingerprinting, privacy and architectures, software tamper resistance, cryptanalysis, and economic and legal aspects.

Product Details

ISBN-13:
9783540436775
Publisher:
Springer Berlin Heidelberg
Publication date:
06/10/2002
Series:
Lecture Notes in Computer Science Series, #2320
Edition description:
2002
Pages:
250
Product dimensions:
9.21(w) x 6.14(h) x 0.55(d)

Table of Contents

Renewability.- Discouraging Software Piracy Using Software Aging.- Fuzzy Hashing.- New Iterative Geometric Methods for Robust Perceptual Image Hashing.- Cryptographic Techniques, Fingerprinting.- On Crafty Pirates and Foxy Tracers.- Efficient State Updates for Key Management.- Collusion Secure q-ary Fingerprinting for Perceptual Content.- Privacy, Architectures.- Privacy Engineering for Digital Rights Management Systems.- Secure Open Systems for Protecting Privacy and Digital Services.- MPEG-4 IPMP Extensions.- Software Tamper Resistance.- Dynamic Self-Checking Techniques for Improved Tamper Resistance.- Protecting Software Code by Guards.- How to Manage Persistent State in DRM Systems.- Cryptanalysis.- A Cryptanalysis of the High-Bandwidth Digital Content Protection System.- Economics, Legal Aspects.- Implications of Digital Rights Management for Online Music – A Business Perspective.- From Copyright to Information Law – Implications of Digital Rights Management.- Taking the Copy Out of Copyright.

Read More

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >