LEADER 04595nam 22008055 450 001 996466056903316 005 20200630042402.0 010 $a3-540-44993-0 024 7 $a10.1007/b11725 035 $a(CKB)1000000000212045 035 $a(SSID)ssj0000322629 035 $a(PQKBManifestationID)11222866 035 $a(PQKBTitleCode)TC0000322629 035 $a(PQKBWorkID)10288252 035 $a(PQKB)11749459 035 $a(DE-He213)978-3-540-44993-5 035 $a(MiAaPQ)EBC3087260 035 $a(PPN)155167456 035 $a(EXLCZ)991000000000212045 100 $a20121227d2003 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aDigital Rights Management$b[electronic resource] $eACM CCS-9 Workshop, DRM 2002, Washington, DC, USA, November 18, 2002, Revised Papers /$fedited by Joan Feigenbaum 205 $a1st ed. 2003. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2003. 215 $a1 online resource (X, 222 p.) 225 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v2696 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-40410-4 320 $aIncludes bibliographical references and index. 327 $aACM DRM 2002 -- A White-Box DES Implementation for DRM Applications -- Attacking an Obfuscated Cipher by Injecting Faults -- Breaking and Repairing Asymmetric Public-Key Traitor Tracing -- Key Challenges in DRM: An Industry Perspective -- Public Key Broadcast Encryption for Stateless Receivers -- Traitor Tracing for Shortened and Corrupted Fingerprints -- Evaluating New Copy-Prevention Techniques for Audio CDs -- Towards Meeting the Privacy Challenge: Adapting DRM -- Implementing Copyright Limitations in Rights Expression Languages -- The Darknet and the Future of Content Protection -- Replacement Attack on Arbitrary Watermarking Systems -- FAIR: Fair Audience InfeRence -- Theft-Protected Proprietary Certificates. 330 $a This book constitutes the thoroughly refereed post-proceedings of the Second International Workshop on Digital Rights Management, DRM 2002, held in Washington, DC, USA, in November 2002, in conjunction with ACM CCS-9. The 13 revised full papers presented were carefully reviewed and selected for inclusion in the book. Among the topics addressed are DES implementation for DRM applications, cryptographic attacks, industrial challenges, public key broadcast encryption, fingerprinting, copy-prevention techniques, copyright limitations, content protection, watermarking systems, and theft-protected proprietary certificates. 410 0$aLecture Notes in Computer Science,$x0302-9743 ;$v2696 606 $aData encryption (Computer science) 606 $aComputer communication systems 606 $aOperating systems (Computers) 606 $aComputers and civilization 606 $aComputers 606 $aLaw and legislation 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aScience, Humanities and Social Sciences, multidisciplinary$3https://scigraph.springernature.com/ontologies/product-market-codes/A11007 606 $aOperating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14045 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aLegal Aspects of Computing$3https://scigraph.springernature.com/ontologies/product-market-codes/I24059 615 0$aData encryption (Computer science). 615 0$aComputer communication systems. 615 0$aOperating systems (Computers). 615 0$aComputers and civilization. 615 0$aComputers. 615 0$aLaw and legislation. 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aScience, Humanities and Social Sciences, multidisciplinary. 615 24$aOperating Systems. 615 24$aComputers and Society. 615 24$aLegal Aspects of Computing. 676 $a005.8 702 $aFeigenbaum$b Joan$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aACM Workshop on Security and Privacy in Digital Rights Management 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466056903316 996 $aDigital rights management$9954133 997 $aUNISA