數(shù)字權(quán)利管理

出版時(shí)間:2006-12  出版社:Springer-Verlag New York Inc  作者:Safavi-naini, Reihaneh (EDT)/ Yung, Moti (EDT)  頁數(shù):357  

內(nèi)容概要

This book constitutes the thoroughly refereed post-proceedings of the First International Conference on Digital Rights Management: Technology, Issues, Challenges and Systems, DRMTICS 2005, held in Sydney, Australia, in October/November 2005.    The 26 revised full papers were carefully reviewed and selected during two rounds of reviewing and improvement from 57 submissions. The papers are organized in topical sections on assurance and authentication issues, legal and related issues, expressing rights and management, watermarking, software issues, fingerprinting and image authentication, supporting cryptographic technology, P2P issues, implementations and architectures.

書籍目錄

Assurance and Authentication Issues A Novel Framework for Multiple Creatorship Protection of Digital Movies TIVA: Trusted Integrity Verification ArchitectureLegal and Related Issues The Australian Sony PlayStation Case: How Far Will Anti-circumvention Law Reach in the Name of DRM? Downloading vs Purchase: Music Industry vs Consumers Digital Rights Management: Merging Contract, Copyright and Criminal LawExpressing Rights and Management User-Attributed Rights in DRM AVS-REL--A New Right Expression Language A Comparative Study of Specification Models for Autonomic Access Control of Digital RightsWatermarking The Effect of Fidelity Measure Functions on the Capacity of Digital Watermarks A MPEG-2 Video Watermarking Algorithm with Compensation in Bit Stream Reversible Semi-fragile Image Authentication Using Zernike Moments and Integer Wavelet TransformSoftware Issues Software Tamper Resistance Through Dynamic Program Monitoring Call Tree Transformation for Program Obfuscation and Copy Protection Algorithms to Watermark Software Through Register AllocationFingerprinting and Image Authentication An Efficient Fingerprinting Scheme with Secret Sharing Worst-Case Optimal Fingerprinting Codes for Non-threshold Collusion Secure Remote Fingerprint Verification Using Dual WatermarksSupporting Cryptographic Technology Security Weaknesses of Certain Broadcast Encryption Schemes A Broadcast Encryption Scheme with Free-Riders but Unconditional Security A Novel Broadcast Encryption Based on Time-Bound Cryptographic Keys……P2P IssuesImplementation and ArchitecturesAuthor Index

圖書封面

評(píng)論、評(píng)分、閱讀與下載


    數(shù)字權(quán)利管理 PDF格式下載


用戶評(píng)論 (總計(jì)0條)

 
 

 

250萬本中文圖書簡(jiǎn)介、評(píng)論、評(píng)分,PDF格式免費(fèi)下載。 第一圖書網(wǎng) 手機(jī)版

京ICP備13047387號(hào)-7