What people are saying - Write a review
We haven't found any reviews in the usual places.
Protecting Digital Archives at the Greek Orthodox Archdiocese of America
Digital Rights Management in a 3G Mobile Phone and Beyond
Supporting Cryptographic Technology
3 other sections not shown
Other editions - View all
access control accumulators agents algorithm allows analysis application attacks attributes authors broadcast called ciphertext clustering Computer consider construct consumer contains contract copies decryption defined described detection device distribution documents domain DRM system elements embedded encryption enforcement example experiments expression fair Figure fingerprint function given identify implemented important industry Internet license Management mark methods movie networks Note obfuscation object obtain operation original output particular party performed permission pirate possible present primary key probability problem production protection random relation release rendering requires running scheme secret selected sharing signature similar specific studios techniques tion tracing trusted tuple unauthorized valid verifiably watermarking