000 04488nam a22003855i 4500
001 295999
003 MX-SnUAN
005 20160429155247.0
007 cr nn 008mamaa
008 150903s2006 gw | o |||| 0|eng d
020 _a9783540359999
_99783540359999
024 7 _a10.1007/11787952
_2doi
035 _avtls000349147
039 9 _a201509030736
_bVLOAD
_c201404121204
_dVLOAD
_c201404090941
_dVLOAD
_y201402071155
_zstaff
040 _aMX-SnUAN
_bspa
_cMX-SnUAN
_erda
050 4 _aQA76.9.A25
100 1 _aSafavi-Naini, Reihaneh.
_eeditor.
_9330550
245 1 0 _aDigital Rights Management. Technologies, Issues, Challenges and Systems :
_bFirst International Conference, DRMTICS 2005, Sydney, Australia, October 31 - November 2, 2005. Revised Selected Papers /
_cedited by Reihaneh Safavi-Naini, Moti Yung.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c2006.
300 _axI, 357 páginas Also available online.
_brecurso en línea.
336 _atexto
_btxt
_2rdacontent
337 _acomputadora
_bc
_2rdamedia
338 _arecurso en línea
_bcr
_2rdacarrier
347 _aarchivo de texto
_bPDF
_2rda
490 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v3919
500 _aSpringer eBooks
505 0 _aAssurance and Authentication Issues -- A Novel Framework for Multiple Creatorship Protection of Digital Movies -- TIVA: Trusted Integrity Verification Architecture -- Legal and Related Issues -- The Australian Sony PlayStation Case: How Far Will Anti-circumvention Law Reach in the Name of DRM? -- Downloading vs Purchase: Music Industry vs Consumers -- Digital Rights Management: Merging Contract, Copyright and Criminal Law -- Expressing Rights and Management -- User-Attributed Rights in DRM -- AVS-REL—A New Right Expression Language -- A Comparative Study of Specification Models for Autonomic Access Control of Digital Rights -- Watermarking -- The Effect of Fidelity Measure Functions on the Capacity of Digital Watermarks -- A MPEG-2 Video Watermarking Algorithm with Compensation in Bit Stream -- Reversible Semi-fragile Image Authentication Using Zernike Moments and Integer Wavelet Transform -- Software Issues -- Software Tamper Resistance Through Dynamic Program Monitoring -- Call Tree Transformation for Program Obfuscation and Copy Protection -- Algorithms to Watermark Software Through Register Allocation -- Fingerprinting and Image Authentication -- An Efficient Fingerprinting Scheme with Secret Sharing -- Worst-Case Optimal Fingerprinting Codes for Non-threshold Collusion -- Secure Remote Fingerprint Verification Using Dual Watermarks -- Supporting Cryptographic Technology -- Security Weaknesses of Certain Broadcast Encryption Schemes -- A Broadcast Encryption Scheme with Free-Riders but Unconditional Security -- A Novel Broadcast Encryption Based on Time-Bound Cryptographic Keys -- A Vector Approach to Cryptography Implementation -- P2P Issues -- A Novel Privacy and Copyright Protection Enforced Peer-to-Peer Network -- Design of a Secure Digital Contents Delivery System in P2P Networks -- Implementations and Architectures -- Real-Time Implementation of Broadcast Switching System Using Audio Watermark -- Enforcing Regional DRM for Multimedia Broadcasts With and Without Trusted Computing -- A DRM System Supporting What You See Is What You Pay.
520 _aThis book constitutes the thoroughly refereed post-proceedings of the First International Conference on Digital Rights Management: Technology, Issues, Challenges and Systems, DRMTICS 2005, held in Sydney, Australia, in October/November 2005. The 26 revised full papers were carefully reviewed and selected during two rounds of reviewing and improvement from 57 submissions. The papers are organized in topical sections on assurance and authentication issues, legal and related issues, expressing rights and management, watermarking, software issues, fingerprinting and image authentication, supporting cryptographic technology, P2P issues, implementations and architectures.
590 _aPara consulta fuera de la UANL se requiere clave de acceso remoto.
700 1 _aYung, Moti.
_eeditor.
_9329299
710 2 _aSpringerLink (Servicio en línea)
_9299170
776 0 8 _iEdición impresa:
_z9783540359982
856 4 0 _uhttp://remoto.dgb.uanl.mx/login?url=http://dx.doi.org/10.1007/11787952
_zConectar a Springer E-Books (Para consulta externa se requiere previa autentificación en Biblioteca Digital UANL)
942 _c14
999 _c295999
_d295999