default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
Likely matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 74 matches
- 2003
- Cameron Craig, Richard Graham:
Rights management in the digital world. Comput. Law Secur. Rev. 19(5): 356-362 (2003) - Sai Ho Kwok, Shing-Chi Cheung, K. C. Wong, K. F. Tsang, Siu Man Lui, Kar Yan Tam:
Integration of digital rights management into the Internet Open Trading Protocol. Decis. Support Syst. 34(4): 413-425 (2003) - Sai Ho Kwok, Siu Man Lui, Shing-Chi Cheung, Kar Yan Tam:
Digital Rights Management in Web Services. Electron. Mark. 13(2): 133-140 (2003) - Christopher May:
Digital rights management and the breakdown of social norms. First Monday 8(11) (2003) - Mark Stamp:
Digital Rights Management: The Technology Behind the Hype. J. Electron. Commer. Res. 4(3): 102-112 (2003) - Sabu Emmanuel, Mohan S. Kankanhalli:
A digital rights management scheme for broadcast video. Multim. Syst. 8(6): 444-458 (2003) - Marcus Peinado, Fabien A. P. Petitcolas, Darko Kirovski:
Digital rights management for digital cinema. Multim. Syst. 9(3): 228-238 (2003) - Marc Fetscherin, Matthias Schmid:
Comparing the usage of digital rights management systems in the music, film, and print industry. ICEC 2003: 316-325 - Goichiro Hanaoka, Kazuto Ogawa, Itsuro Murota, Go Ohtake, Keigo Majima, Kimiyuki Oyamada, Seiichi Gohshi, Seiichi Namba, Hideki Imai:
Separating Encryption and Key Issuance in Digital Rights Management Systems. ACISP 2003: 365-376 - Timothy C. Hoad, Justin Zobel:
Video Similarity Detection for Digital Rights Management. ACSC 2003: 237-245 - Qiong Liu, Reihaneh Safavi-Naini, Nicholas Paul Sheppard:
Digital Rights Management for Content Distribution. ACSW 2003: 49-58 - Michael Nielen:
Digital Rights Management Systeme - Auswirkungen für die Wissenschaft. DFN-Arbeitstagung über Kommunikationsnetze 2003: 663-675 - André Adelsbach, Stefan Katzenbeisser, Helmut Veith:
Watermarking schemes provably secure against copy and ambiguity attacks. Digital Rights Management Workshop 2003: 111-119 - Nuttapong Attrapadung, Kazukuni Kobara, Hideki Imai:
Broadcast encryption with short keys and transmissions. Digital Rights Management Workshop 2003: 55-66 - Simon D. Byers, Lorrie Faith Cranor, David P. Kormann, Patrick D. McDaniel, Eric Cronin:
Analysis of security vulnerabilities in the movie production and distribution process. Digital Rights Management Workshop 2003: 1-12 - Yevgeniy Dodis, Leonid Reyzin:
Breaking and repairing optimistic fair exchange from PODC 2003. Digital Rights Management Workshop 2003: 47-54 - Tsvi Gal, Howard M. Singer, Laird Popkin:
The IP war: apocalypse or revolution? Digital Rights Management Workshop 2003: 39-46 - Susanne Guth, Gustaf Neumann, Mark Strembeck:
Experiences with the enforcement of access rights extracted from ODRL-based digital contracts. Digital Rights Management Workshop 2003: 90-102 - Gregory L. Heileman, Yunlong Yang:
The effects of invisible watermarking on satellite image classification. Digital Rights Management Workshop 2003: 120-132 - Yingjiu Li, Vipin Swarup, Sushil Jajodia:
Constructing a virtual primary key for fingerprinting relational data. Digital Rights Management Workshop 2003: 133-141 - Thomas S. Messerges, Ezzat A. Dabbish:
Digital rights management in a 3G mobile phone and beyond. Digital Rights Management Workshop 2003: 27-38 - Deirdre K. Mulligan, John Han, Aaron J. Burstein:
How DRM-based content delivery systems disrupt expectations of "personal use". Digital Rights Management Workshop 2003: 77-89 - Howard Goldstein, Gregory L. Heileman, Mark D. Heileman, Theo Nicolakis, Carlos E. Pizano, Bianca Prumo, Mitchell Webb:
Protecting digital archives at the Greek Orthodox Archdiocese of America. Digital Rights Management Workshop 2003: 13-26 - Mikhail Sosonkin, Gleb Naumovich, Nasir D. Memon:
Obfuscation of design intent in object-oriented applications. Digital Rights Management Workshop 2003: 142-153 - Vu Dong Tô, Reihaneh Safavi-Naini, Fangguo Zhang:
New traitor tracing schemes using bilinear map. Digital Rights Management Workshop 2003: 67-76 - Özlem Uzuner, Randall Davis:
Content and expression-based copy recognition for intellectual property protection. Digital Rights Management Workshop 2003: 103-110 - Zhaofeng Ma, Boqin Feng:
Secure Super-distribution Protocol for Digital Rights Management in Unauthentic Network Environment. GCC (1) 2003: 1039-1042 - Jeffrey A. Bloom:
Security and rights management in digital cinema. ICASSP (4) 2003: 712-715 - Jeffrey A. Bloom:
Security and rights management in digital cinema. ICME 2003: 621-624 - Makoto Amamiya, Keith L. Clark, Tadashige Iwao, Frank G. McCabe, Makoto Okada, Jeremy Pitt:
Individual Digital Rights Management in Multi-agent Information Trading Societies. MAMUS 2003: 154-173
skipping 44 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-08 18:24 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint