Digital Rights Management
Editat de Reihaneh Safavi-Naini, Moti Yungen Limba Engleză Paperback – 30 iun 2006
Preț: 325.06 lei
Preț vechi: 406.33 lei
-20% Nou
Puncte Express: 488
Preț estimativ în valută:
57.52€ • 67.45$ • 50.52£
57.52€ • 67.45$ • 50.52£
Carte tipărită la comandă
Livrare economică 16 februarie-02 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540359982
ISBN-10: 3540359982
Pagini: 376
Ilustrații: XII, 360 p.
Dimensiuni: 155 x 235 x 21 mm
Greutate: 0.57 kg
Ediția:2006
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540359982
Pagini: 376
Ilustrații: XII, 360 p.
Dimensiuni: 155 x 235 x 21 mm
Greutate: 0.57 kg
Ediția:2006
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Assurance and Authentication Issues.- A Novel Framework for Multiple Creatorship Protection of Digital Movies.- TIVA: Trusted Integrity Verification Architecture.- Legal and Related Issues.- The Australian Sony PlayStation Case: How Far Will Anti-circumvention Law Reach in the Name of DRM?.- Downloading vs Purchase: Music Industry vs Consumers.- Digital Rights Management: Merging Contract, Copyright and Criminal Law.- Expressing Rights and Management.- User-Attributed Rights in DRM.- AVS-REL—A New Right Expression Language.- A Comparative Study of Specification Models for Autonomic Access Control of Digital Rights.- Watermarking.- The Effect of Fidelity Measure Functions on the Capacity of Digital Watermarks.- A MPEG-2 Video Watermarking Algorithm with Compensation in Bit Stream.- Reversible Semi-fragile Image Authentication Using Zernike Moments and Integer Wavelet Transform.- Software Issues.- Software Tamper Resistance Through Dynamic Program Monitoring.- Call Tree Transformation for Program Obfuscation and Copy Protection.- Algorithms to Watermark Software Through Register Allocation.- Fingerprinting and Image Authentication.- An Efficient Fingerprinting Scheme with Secret Sharing.- Worst-Case Optimal Fingerprinting Codes for Non-threshold Collusion.- Secure Remote Fingerprint Verification Using Dual Watermarks.- Supporting Cryptographic Technology.- Security Weaknesses of Certain Broadcast Encryption Schemes.- A Broadcast Encryption Scheme with Free-Riders but Unconditional Security.- A Novel Broadcast Encryption Based on Time-Bound Cryptographic Keys.- A Vector Approach to Cryptography Implementation.- P2P Issues.- A Novel Privacy and Copyright Protection Enforced Peer-to-Peer Network.- Design of a Secure Digital Contents Delivery System in P2P Networks.-Implementations and Architectures.- Real-Time Implementation of Broadcast Switching System Using Audio Watermark.- Enforcing Regional DRM for Multimedia Broadcasts With and Without Trusted Computing.- A DRM System Supporting What You See Is What You Pay.