Abstract is missing.
- A security architecture for pay-per-view business models in conditional access systemsBart Kirkels, Martijn Maas, Peter Roelse. 1-9 [doi]
- On implementing mpeg-21 intellectual property management and protectionNicholas Paul Sheppard. 10-22 [doi]
- Drm to counter side-channel attacks?Ryad Benadjila, Olivier Billet, Stanislas Francfort. 23-32 [doi]
- Protecting fair use from digital rights management in chinaHuijia Xie. 33-38 [doi]
- Digital rights management: desirable, inevitable, and almost irrelevantAndrew M. Odlyzko. 39-40 [doi]
- Persistent access control: a formal model for DRMAlapan Arnab, Andrew Hutchison. 41-53 [doi]
- The drm gameGregory L. Heileman, Pramod A. Jamkhedkar, Joud Khoury, Curtis J. Hrncir. 54-62 [doi]
- Data structures for limited oblivious execution of programs while preserving locality of referenceAvinash V. Varadarajan, Ramarathnam Venkatesan, C. Pandu Rangan. 63-69 [doi]
- Slicing obfuscations: design, correctness, and evaluationAnirban Majumdar, Stephen Drape, Clark D. Thomborson. 70-81 [doi]
- Mechanism for software tamper resistance: an application of white-box cryptographyWil Michiels, Paul Gorissen. 82-89 [doi]
- Randomized radon transforms for biometric authentication via fingerprint hashingMariusz H. Jakubowski, Ramarathnam Venkatesan. 90-94 [doi]