Search dblp for Publications

export results for "stream:conf/drm:"

 download as .bib file

@inproceedings{DBLP:conf/drm/Boyden11,
  author       = {Bruce E. Boyden},
  editor       = {Yan Chen and
                  Stefan Katzenbeisser and
                  Ahmad{-}Reza Sadeghi},
  title        = {Is {DRM} working?: how could we tell?},
  booktitle    = {Proceedings of the 11th {ACM} Workshop on Digital Rights Management,
                  Chicago, Illinois, USA, October 21, 2011},
  pages        = {1--2},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046631.2046633},
  doi          = {10.1145/2046631.2046633},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/Boyden11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/JafariSS11,
  author       = {Mohammad Jafari and
                  Reihaneh Safavi{-}Naini and
                  Nicholas Paul Sheppard},
  editor       = {Yan Chen and
                  Stefan Katzenbeisser and
                  Ahmad{-}Reza Sadeghi},
  title        = {A rights management approach to protection of privacy in a cloud of
                  electronic health records},
  booktitle    = {Proceedings of the 11th {ACM} Workshop on Digital Rights Management,
                  Chicago, Illinois, USA, October 21, 2011},
  pages        = {23--30},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046631.2046637},
  doi          = {10.1145/2046631.2046637},
  timestamp    = {Wed, 30 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/JafariSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/JoyeL11,
  author       = {Marc Joye and
                  Tancr{\`{e}}de Lepoint},
  editor       = {Yan Chen and
                  Stefan Katzenbeisser and
                  Ahmad{-}Reza Sadeghi},
  title        = {Traitor tracing schemes for protected software implementations},
  booktitle    = {Proceedings of the 11th {ACM} Workshop on Digital Rights Management,
                  Chicago, Illinois, USA, October 21, 2011},
  pages        = {15--22},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046631.2046636},
  doi          = {10.1145/2046631.2046636},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/JoyeL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/KirovskiM11,
  author       = {Darko Kirovski and
                  Christopher Meek},
  editor       = {Yan Chen and
                  Stefan Katzenbeisser and
                  Ahmad{-}Reza Sadeghi},
  title        = {Tunneled {TLS} for multi-factor authentication},
  booktitle    = {Proceedings of the 11th {ACM} Workshop on Digital Rights Management,
                  Chicago, Illinois, USA, October 21, 2011},
  pages        = {31--40},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046631.2046639},
  doi          = {10.1145/2046631.2046639},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/KirovskiM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/LambJBNH11,
  author       = {Christopher C. Lamb and
                  Pramod A. Jamkhedkar and
                  Mathew P. Bohnsack and
                  Viswanath Nandina and
                  Gregory L. Heileman},
  editor       = {Yan Chen and
                  Stefan Katzenbeisser and
                  Ahmad{-}Reza Sadeghi},
  title        = {A domain specific language for usage management},
  booktitle    = {Proceedings of the 11th {ACM} Workshop on Digital Rights Management,
                  Chicago, Illinois, USA, October 21, 2011},
  pages        = {51--62},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046631.2046641},
  doi          = {10.1145/2046631.2046641},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/LambJBNH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/SchaferBS11,
  author       = {Marcel Sch{\"{a}}fer and
                  Waldemar Berchtold and
                  Martin Steinebach},
  editor       = {Yan Chen and
                  Stefan Katzenbeisser and
                  Ahmad{-}Reza Sadeghi},
  title        = {Fast and adaptive tracing strategies for 3-secure fingerprint watermarking
                  codes},
  booktitle    = {Proceedings of the 11th {ACM} Workshop on Digital Rights Management,
                  Chicago, Illinois, USA, October 21, 2011},
  pages        = {41--50},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046631.2046640},
  doi          = {10.1145/2046631.2046640},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/SchaferBS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/WeiKP11,
  author       = {Sheng Wei and
                  Farinaz Koushanfar and
                  Miodrag Potkonjak},
  editor       = {Yan Chen and
                  Stefan Katzenbeisser and
                  Ahmad{-}Reza Sadeghi},
  title        = {Integrated circuit digital rights management techniques using physical
                  level characterization},
  booktitle    = {Proceedings of the 11th {ACM} Workshop on Digital Rights Management,
                  Chicago, Illinois, USA, October 21, 2011},
  pages        = {3--14},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046631.2046635},
  doi          = {10.1145/2046631.2046635},
  timestamp    = {Fri, 04 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/WeiKP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/drm/2011,
  editor       = {Yan Chen and
                  Stefan Katzenbeisser and
                  Ahmad{-}Reza Sadeghi},
  title        = {Proceedings of the 11th {ACM} Workshop on Digital Rights Management,
                  Chicago, Illinois, USA, October 21, 2011},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {http://dl.acm.org/citation.cfm?id=2046631},
  isbn         = {978-1-4503-1005-5},
  timestamp    = {Tue, 16 Dec 2014 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/BonehKM10,
  author       = {Dan Boneh and
                  Aggelos Kiayias and
                  Hart William Montgomery},
  editor       = {Ehab Al{-}Shaer and
                  Hongxia Jin and
                  Marc Joye},
  title        = {Robust fingerprinting codes: a near optimal construction},
  booktitle    = {Proceedings of the 10th {ACM} Workshop on Digital Rights Management,
                  Chicago, Illinois, USA, October 4, 2010},
  pages        = {3--12},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866870.1866873},
  doi          = {10.1145/1866870.1866873},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/BonehKM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/CappaertP10,
  author       = {Jan Cappaert and
                  Bart Preneel},
  editor       = {Ehab Al{-}Shaer and
                  Hongxia Jin and
                  Marc Joye},
  title        = {A general model for hiding control flow},
  booktitle    = {Proceedings of the 10th {ACM} Workshop on Digital Rights Management,
                  Chicago, Illinois, USA, October 4, 2010},
  pages        = {35--42},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866870.1866877},
  doi          = {10.1145/1866870.1866877},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/CappaertP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/ChangFX10,
  author       = {Ee{-}Chien Chang and
                  Chengfang Fang and
                  Jia Xu},
  editor       = {Ehab Al{-}Shaer and
                  Hongxia Jin and
                  Marc Joye},
  title        = {A chameleon encryption scheme resistant to known-plaintext attack},
  booktitle    = {Proceedings of the 10th {ACM} Workshop on Digital Rights Management,
                  Chicago, Illinois, USA, October 4, 2010},
  pages        = {25--34},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866870.1866876},
  doi          = {10.1145/1866870.1866876},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/ChangFX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/DiehlR10,
  author       = {Eric Diehl and
                  Arnaud Robert},
  editor       = {Ehab Al{-}Shaer and
                  Hongxia Jin and
                  Marc Joye},
  title        = {An introduction to interoperable digital rights locker},
  booktitle    = {Proceedings of the 10th {ACM} Workshop on Digital Rights Management,
                  Chicago, Illinois, USA, October 4, 2010},
  pages        = {51--54},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866870.1866881},
  doi          = {10.1145/1866870.1866881},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/DiehlR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/FujitaT10,
  author       = {Kunihiko Fujita and
                  Yasuyuki Tsukada},
  editor       = {Ehab Al{-}Shaer and
                  Hongxia Jin and
                  Marc Joye},
  title        = {An analysis of interoperability between licenses},
  booktitle    = {Proceedings of the 10th {ACM} Workshop on Digital Rights Management,
                  Chicago, Illinois, USA, October 4, 2010},
  pages        = {61--72},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866870.1866884},
  doi          = {10.1145/1866870.1866884},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/FujitaT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/GowadiaSLSO10,
  author       = {Vaibhav Gowadia and
                  Enrico Scalavino and
                  Emil C. Lupu and
                  Dmitry Starostin and
                  Alexey Orlov},
  editor       = {Ehab Al{-}Shaer and
                  Hongxia Jin and
                  Marc Joye},
  title        = {Secure cross-domain data sharing architecture for crisis management},
  booktitle    = {Proceedings of the 10th {ACM} Workshop on Digital Rights Management,
                  Chicago, Illinois, USA, October 4, 2010},
  pages        = {43--46},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866870.1866879},
  doi          = {10.1145/1866870.1866879},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/GowadiaSLSO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/JafariSSS10,
  author       = {Mohammad Jafari and
                  Reihaneh Safavi{-}Naini and
                  Chad Saunders and
                  Nicholas Paul Sheppard},
  editor       = {Ehab Al{-}Shaer and
                  Hongxia Jin and
                  Marc Joye},
  title        = {Using digital rights management for securing data in a medical research
                  environment},
  booktitle    = {Proceedings of the 10th {ACM} Workshop on Digital Rights Management,
                  Chicago, Illinois, USA, October 4, 2010},
  pages        = {55--60},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866870.1866883},
  doi          = {10.1145/1866870.1866883},
  timestamp    = {Wed, 30 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/JafariSSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/JamkhedkarHL10,
  author       = {Pramod A. Jamkhedkar and
                  Gregory L. Heileman and
                  Chris C. Lamb},
  editor       = {Ehab Al{-}Shaer and
                  Hongxia Jin and
                  Marc Joye},
  title        = {An interoperable usage management framework},
  booktitle    = {Proceedings of the 10th {ACM} Workshop on Digital Rights Management,
                  Chicago, Illinois, USA, October 4, 2010},
  pages        = {73--88},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866870.1866885},
  doi          = {10.1145/1866870.1866885},
  timestamp    = {Tue, 06 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/JamkhedkarHL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/JunodK10,
  author       = {Pascal Junod and
                  Alexandre Karlov},
  editor       = {Ehab Al{-}Shaer and
                  Hongxia Jin and
                  Marc Joye},
  title        = {An efficient public-key attribute-based broadcast encryption scheme
                  allowing arbitrary access policies},
  booktitle    = {Proceedings of the 10th {ACM} Workshop on Digital Rights Management,
                  Chicago, Illinois, USA, October 4, 2010},
  pages        = {13--24},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866870.1866875},
  doi          = {10.1145/1866870.1866875},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/JunodK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/LuoHC10,
  author       = {Song Luo and
                  Jian{-}bin Hu and
                  Zhong Chen},
  editor       = {Ehab Al{-}Shaer and
                  Hongxia Jin and
                  Marc Joye},
  title        = {New construction of identity-based proxy re-encryption},
  booktitle    = {Proceedings of the 10th {ACM} Workshop on Digital Rights Management,
                  Chicago, Illinois, USA, October 4, 2010},
  pages        = {47--50},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866870.1866880},
  doi          = {10.1145/1866870.1866880},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/LuoHC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/Naor10,
  author       = {Moni Naor},
  editor       = {Ehab Al{-}Shaer and
                  Hongxia Jin and
                  Marc Joye},
  title        = {The privacy of tracing traitors},
  booktitle    = {Proceedings of the 10th {ACM} Workshop on Digital Rights Management,
                  Chicago, Illinois, USA, October 4, 2010},
  pages        = {1--2},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866870.1866871},
  doi          = {10.1145/1866870.1866871},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/Naor10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/drm/2010,
  editor       = {Ehab Al{-}Shaer and
                  Hongxia Jin and
                  Marc Joye},
  title        = {Proceedings of the 10th {ACM} Workshop on Digital Rights Management,
                  Chicago, Illinois, USA, October 4, 2010},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {http://dl.acm.org/citation.cfm?id=1866870},
  isbn         = {978-1-4503-0091-9},
  timestamp    = {Wed, 28 Mar 2012 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/AlessioJ09,
  author       = {Davide Alessio and
                  Marc Joye},
  editor       = {Ehab Al{-}Shaer and
                  Hongxia Jin and
                  Gregory L. Heileman},
  title        = {A simple construction for public-key encryption with revocable anonymity:
                  the honest-sender case},
  booktitle    = {Proceedings of the 9th {ACM} Workshop on Digital Rights Management,
                  Chicago, Illinois, USA, November 9, 2009},
  pages        = {11--16},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1655048.1655051},
  doi          = {10.1145/1655048.1655051},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/AlessioJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/KeohV09,
  author       = {Sye Loong Keoh and
                  Koen Vrielink},
  editor       = {Ehab Al{-}Shaer and
                  Hongxia Jin and
                  Gregory L. Heileman},
  title        = {An implementation experience of domain management in marlin},
  booktitle    = {Proceedings of the 9th {ACM} Workshop on Digital Rights Management,
                  Chicago, Illinois, USA, November 9, 2009},
  pages        = {29--38},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1655048.1655054},
  doi          = {10.1145/1655048.1655054},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/KeohV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/KiayiasP09,
  author       = {Aggelos Kiayias and
                  Serdar Pehlivanoglu},
  editor       = {Ehab Al{-}Shaer and
                  Hongxia Jin and
                  Gregory L. Heileman},
  title        = {On the security of a public-key traitor tracing scheme with sublinear
                  ciphertext size},
  booktitle    = {Proceedings of the 9th {ACM} Workshop on Digital Rights Management,
                  Chicago, Illinois, USA, November 9, 2009},
  pages        = {1--10},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1655048.1655050},
  doi          = {10.1145/1655048.1655050},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/KiayiasP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/Lotspiech09,
  author       = {Jeffrey B. Lotspiech},
  editor       = {Ehab Al{-}Shaer and
                  Hongxia Jin and
                  Gregory L. Heileman},
  title        = {Broadcast encryption versus public key cryptography in content protection
                  systems},
  booktitle    = {Proceedings of the 9th {ACM} Workshop on Digital Rights Management,
                  Chicago, Illinois, USA, November 9, 2009},
  pages        = {39--46},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1655048.1655055},
  doi          = {10.1145/1655048.1655055},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/Lotspiech09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/NarayananRV09,
  author       = {Srivatsan Narayanan and
                  Ananth Raghunathan and
                  Ramarathnam Venkatesan},
  editor       = {Ehab Al{-}Shaer and
                  Hongxia Jin and
                  Gregory L. Heileman},
  title        = {Obfuscating straight line arithmetic programs},
  booktitle    = {Proceedings of the 9th {ACM} Workshop on Digital Rights Management,
                  Chicago, Illinois, USA, November 9, 2009},
  pages        = {47--58},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1655048.1655057},
  doi          = {10.1145/1655048.1655057},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/NarayananRV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/SachanEK09,
  author       = {Amit Sachan and
                  Sabu Emmanuel and
                  Mohan S. Kankanhalli},
  editor       = {Ehab Al{-}Shaer and
                  Hongxia Jin and
                  Gregory L. Heileman},
  title        = {Efficient license validation in {MPML} {DRM} architecture},
  booktitle    = {Proceedings of the 9th {ACM} Workshop on Digital Rights Management,
                  Chicago, Illinois, USA, November 9, 2009},
  pages        = {73--82},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1655048.1655060},
  doi          = {10.1145/1655048.1655060},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/SachanEK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/SheppardS09,
  author       = {Nicholas Paul Sheppard and
                  Reihaneh Safavi{-}Naini},
  editor       = {Ehab Al{-}Shaer and
                  Hongxia Jin and
                  Gregory L. Heileman},
  title        = {On the operational semantics of rights expression languages},
  booktitle    = {Proceedings of the 9th {ACM} Workshop on Digital Rights Management,
                  Chicago, Illinois, USA, November 9, 2009},
  pages        = {17--28},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1655048.1655052},
  doi          = {10.1145/1655048.1655052},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/SheppardS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/Troncoso-PastorizaCPP09,
  author       = {Juan Ram{\'{o}}n Troncoso{-}Pastoriza and
                  Pedro Comesa{\~{n}}a and
                  Luis P{\'{e}}rez{-}Freire and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  editor       = {Ehab Al{-}Shaer and
                  Hongxia Jin and
                  Gregory L. Heileman},
  title        = {Videosurveillance and privacy: covering the two sides of the mirror
                  with {DRM}},
  booktitle    = {Proceedings of the 9th {ACM} Workshop on Digital Rights Management,
                  Chicago, Illinois, USA, November 9, 2009},
  pages        = {83--94},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1655048.1655061},
  doi          = {10.1145/1655048.1655061},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/Troncoso-PastorizaCPP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/ZhangWTWC09,
  author       = {Changjiang Zhang and
                  Jianmin Wang and
                  Clark D. Thomborson and
                  Chaokun Wang and
                  Christian S. Collberg},
  editor       = {Ehab Al{-}Shaer and
                  Hongxia Jin and
                  Gregory L. Heileman},
  title        = {A semi-dynamic multiple watermarking schemefor java applications},
  booktitle    = {Proceedings of the 9th {ACM} Workshop on Digital Rights Management,
                  Chicago, Illinois, USA, November 9, 2009},
  pages        = {59--72},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1655048.1655058},
  doi          = {10.1145/1655048.1655058},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/ZhangWTWC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/drm/2009,
  editor       = {Ehab Al{-}Shaer and
                  Hongxia Jin and
                  Gregory L. Heileman},
  title        = {Proceedings of the 9th {ACM} Workshop on Digital Rights Management,
                  Chicago, Illinois, USA, November 9, 2009},
  publisher    = {{ACM}},
  year         = {2009},
  isbn         = {978-1-60558-779-0},
  timestamp    = {Wed, 25 Nov 2009 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/BeckerAS08,
  author       = {Anja Becker and
                  Alapan Arnab and
                  Merc{\`{e}} Serra},
  editor       = {Gregory L. Heileman and
                  Marc Joye},
  title        = {Assessing privacy criteria for drm using eu privacy legislation},
  booktitle    = {Proceedings of the 8th {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, October 27, 2008},
  pages        = {77--86},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456520.1456534},
  doi          = {10.1145/1456520.1456534},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/BeckerAS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/Diehl08,
  author       = {Eric Diehl},
  editor       = {Gregory L. Heileman and
                  Marc Joye},
  title        = {A four-layer model for security of digital rights management},
  booktitle    = {Proceedings of the 8th {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, October 27, 2008},
  pages        = {19--28},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456520.1456527},
  doi          = {10.1145/1456520.1456527},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/Diehl08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/DoerrK08,
  author       = {Gwena{\"{e}}l J. Do{\"{e}}rr and
                  Ton Kalker},
  editor       = {Gregory L. Heileman and
                  Marc Joye},
  title        = {Design rules for interoperable domains: controlling content dilution
                  and content sharing},
  booktitle    = {Proceedings of the 8th {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, October 27, 2008},
  pages        = {39--50},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456520.1456529},
  doi          = {10.1145/1456520.1456529},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/DoerrK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/JamkhedkarH08,
  author       = {Pramod A. Jamkhedkar and
                  Gregory L. Heileman},
  editor       = {Gregory L. Heileman and
                  Marc Joye},
  title        = {A formal conceptual model for rights},
  booktitle    = {Proceedings of the 8th {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, October 27, 2008},
  pages        = {29--38},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456520.1456528},
  doi          = {10.1145/1456520.1456528},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/JamkhedkarH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/JinLNM08,
  author       = {Hongxia Jin and
                  Jeffrey B. Lotspiech and
                  Michael J. Nelson and
                  Nimrod Megiddo},
  editor       = {Gregory L. Heileman and
                  Marc Joye},
  title        = {Adaptive traitor tracing for large anonymous attack},
  booktitle    = {Proceedings of the 8th {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, October 27, 2008},
  pages        = {1--8},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456520.1456524},
  doi          = {10.1145/1456520.1456524},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/JinLNM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/KiayiasY08,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  editor       = {Gregory L. Heileman and
                  Marc Joye},
  title        = {Public-key traitor tracing from efficient decoding and unbounded enrollment:
                  extended abstract},
  booktitle    = {Proceedings of the 8th {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, October 27, 2008},
  pages        = {9--18},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456520.1456525},
  doi          = {10.1145/1456520.1456525},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/KiayiasY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/KirtaneR08,
  author       = {Varad Kirtane and
                  C. Pandu Rangan},
  editor       = {Gregory L. Heileman and
                  Marc Joye},
  title        = {{RSA-TBOS} signcryption with proxy re-encryption},
  booktitle    = {Proceedings of the 8th {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, October 27, 2008},
  pages        = {59--66},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456520.1456531},
  doi          = {10.1145/1456520.1456531},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/KirtaneR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/NairTGC08,
  author       = {Srijith Krishnan Nair and
                  Andrew S. Tanenbaum and
                  Gabriela Gheorghe and
                  Bruno Crispo},
  editor       = {Gregory L. Heileman and
                  Marc Joye},
  title        = {Enforcing {DRM} policies across applications},
  booktitle    = {Proceedings of the 8th {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, October 27, 2008},
  pages        = {87--94},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456520.1456535},
  doi          = {10.1145/1456520.1456535},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/NairTGC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/VarnaSW08,
  author       = {Avinash L. Varna and
                  Ashwin Swaminathan and
                  Min Wu},
  editor       = {Gregory L. Heileman and
                  Marc Joye},
  title        = {A decision theoretic framework for analyzing binary hash-based content
                  identification systems},
  booktitle    = {Proceedings of the 8th {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, October 27, 2008},
  pages        = {67--76},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456520.1456532},
  doi          = {10.1145/1456520.1456532},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/VarnaSW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/Yacobi08,
  author       = {Yacov Yacobi},
  editor       = {Gregory L. Heileman and
                  Marc Joye},
  title        = {Content identification},
  booktitle    = {Proceedings of the 8th {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, October 27, 2008},
  pages        = {51--52},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456520.1456521},
  doi          = {10.1145/1456520.1456521},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/Yacobi08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/YacobiY08,
  author       = {Yacov Yacobi and
                  Gideon Yaniv},
  editor       = {Gregory L. Heileman and
                  Marc Joye},
  title        = {Counterfeiting and anti-counterfeitingof software and content},
  booktitle    = {Proceedings of the 8th {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, October 27, 2008},
  pages        = {53--58},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456520.1456522},
  doi          = {10.1145/1456520.1456522},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/YacobiY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/drm/2008,
  editor       = {Gregory L. Heileman and
                  Marc Joye},
  title        = {Proceedings of the 8th {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, October 27, 2008},
  publisher    = {{ACM}},
  year         = {2008},
  isbn         = {978-1-60558-290-0},
  timestamp    = {Tue, 11 Nov 2008 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/ArnabH07,
  author       = {Alapan Arnab and
                  Andrew Hutchison},
  editor       = {Moti Yung and
                  Aggelos Kiayias and
                  Ahmad{-}Reza Sadeghi},
  title        = {Persistent access control: a formal model for {DRM}},
  booktitle    = {Proceedings of the Seventh {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, October 29, 2007},
  pages        = {41--53},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1314276.1314286},
  doi          = {10.1145/1314276.1314286},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/ArnabH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/BenadjilaBF07,
  author       = {Ryad Benadjila and
                  Olivier Billet and
                  Stanislas Francfort},
  editor       = {Moti Yung and
                  Aggelos Kiayias and
                  Ahmad{-}Reza Sadeghi},
  title        = {Drm to counter side-channel attacks?},
  booktitle    = {Proceedings of the Seventh {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, October 29, 2007},
  pages        = {23--32},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1314276.1314282},
  doi          = {10.1145/1314276.1314282},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/BenadjilaBF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/HeilemanJKH07,
  author       = {Gregory L. Heileman and
                  Pramod A. Jamkhedkar and
                  Joud S. Khoury and
                  Curtis J. Hrncir},
  editor       = {Moti Yung and
                  Aggelos Kiayias and
                  Ahmad{-}Reza Sadeghi},
  title        = {The drm game},
  booktitle    = {Proceedings of the Seventh {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, October 29, 2007},
  pages        = {54--62},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1314276.1314287},
  doi          = {10.1145/1314276.1314287},
  timestamp    = {Mon, 06 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/HeilemanJKH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/JakubowskiV07,
  author       = {Mariusz H. Jakubowski and
                  Ramarathnam Venkatesan},
  editor       = {Moti Yung and
                  Aggelos Kiayias and
                  Ahmad{-}Reza Sadeghi},
  title        = {Randomized radon transforms for biometric authentication via fingerprint
                  hashing},
  booktitle    = {Proceedings of the Seventh {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, October 29, 2007},
  pages        = {90--94},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1314276.1314293},
  doi          = {10.1145/1314276.1314293},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/JakubowskiV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/KirkelsMR07,
  author       = {Bart Kirkels and
                  Martijn Maas and
                  Peter Roelse},
  editor       = {Moti Yung and
                  Aggelos Kiayias and
                  Ahmad{-}Reza Sadeghi},
  title        = {A security architecture for pay-per-view business models in conditional
                  access systems},
  booktitle    = {Proceedings of the Seventh {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, October 29, 2007},
  pages        = {1--9},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1314276.1314279},
  doi          = {10.1145/1314276.1314279},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/KirkelsMR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/MajumdarDT07,
  author       = {Anirban Majumdar and
                  Stephen Drape and
                  Clark D. Thomborson},
  editor       = {Moti Yung and
                  Aggelos Kiayias and
                  Ahmad{-}Reza Sadeghi},
  title        = {Slicing obfuscations: design, correctness, and evaluation},
  booktitle    = {Proceedings of the Seventh {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, October 29, 2007},
  pages        = {70--81},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1314276.1314290},
  doi          = {10.1145/1314276.1314290},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/MajumdarDT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/MichielsG07,
  author       = {Wil Michiels and
                  Paul Gorissen},
  editor       = {Moti Yung and
                  Aggelos Kiayias and
                  Ahmad{-}Reza Sadeghi},
  title        = {Mechanism for software tamper resistance: an application of white-box
                  cryptography},
  booktitle    = {Proceedings of the Seventh {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, October 29, 2007},
  pages        = {82--89},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1314276.1314291},
  doi          = {10.1145/1314276.1314291},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/MichielsG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/Odlyzko07,
  author       = {Andrew M. Odlyzko},
  editor       = {Moti Yung and
                  Aggelos Kiayias and
                  Ahmad{-}Reza Sadeghi},
  title        = {Digital rights management: desirable, inevitable, and almost irrelevant},
  booktitle    = {Proceedings of the Seventh {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, October 29, 2007},
  pages        = {39--40},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1314276.1314277},
  doi          = {10.1145/1314276.1314277},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/Odlyzko07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/Sheppard07,
  author       = {Nicholas Paul Sheppard},
  editor       = {Moti Yung and
                  Aggelos Kiayias and
                  Ahmad{-}Reza Sadeghi},
  title        = {On implementing mpeg-21 intellectual property management and protection},
  booktitle    = {Proceedings of the Seventh {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, October 29, 2007},
  pages        = {10--22},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1314276.1314280},
  doi          = {10.1145/1314276.1314280},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/Sheppard07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/VaradarajanVR07,
  author       = {Avinash V. Varadarajan and
                  Ramarathnam Venkatesan and
                  C. Pandu Rangan},
  editor       = {Moti Yung and
                  Aggelos Kiayias and
                  Ahmad{-}Reza Sadeghi},
  title        = {Data structures for limited oblivious execution of programs while
                  preserving locality of reference},
  booktitle    = {Proceedings of the Seventh {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, October 29, 2007},
  pages        = {63--69},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1314276.1314289},
  doi          = {10.1145/1314276.1314289},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/VaradarajanVR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/Xie07,
  author       = {Huijia Xie},
  editor       = {Moti Yung and
                  Aggelos Kiayias and
                  Ahmad{-}Reza Sadeghi},
  title        = {Protecting fair use from digital rights management in china},
  booktitle    = {Proceedings of the Seventh {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, October 29, 2007},
  pages        = {33--38},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1314276.1314284},
  doi          = {10.1145/1314276.1314284},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/Xie07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/drm/2007,
  editor       = {Moti Yung and
                  Aggelos Kiayias and
                  Ahmad{-}Reza Sadeghi},
  title        = {Proceedings of the Seventh {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, October 29, 2007},
  publisher    = {{ACM}},
  year         = {2007},
  isbn         = {978-1-59593-884-8},
  timestamp    = {Thu, 17 Jan 2008 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/AnckaertJV06,
  author       = {Bertrand Anckaert and
                  Mariusz H. Jakubowski and
                  Ramarathnam Venkatesan},
  editor       = {Moti Yung and
                  Kaoru Kurosawa and
                  Reihaneh Safavi{-}Naini},
  title        = {Proteus: virtualization for diversified tamper-resistance},
  booktitle    = {Proceedings of the Sixth {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, October 30, 2006},
  pages        = {47--58},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1179509.1179521},
  doi          = {10.1145/1179509.1179521},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/AnckaertJV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/ArnabH06,
  author       = {Alapan Arnab and
                  Andrew Hutchison},
  editor       = {Moti Yung and
                  Kaoru Kurosawa and
                  Reihaneh Safavi{-}Naini},
  title        = {Verifiable digital object identity system},
  booktitle    = {Proceedings of the Sixth {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, October 30, 2006},
  pages        = {19--26},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1179509.1179514},
  doi          = {10.1145/1179509.1179514},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/ArnabH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/BordersZP06,
  author       = {Kevin Borders and
                  Xin Zhao and
                  Atul Prakash},
  editor       = {Moti Yung and
                  Kaoru Kurosawa and
                  Reihaneh Safavi{-}Naini},
  title        = {Securing sensitive content in a view-only file system},
  booktitle    = {Proceedings of the Sixth {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, October 30, 2006},
  pages        = {27--36},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1179509.1179515},
  doi          = {10.1145/1179509.1179515},
  timestamp    = {Thu, 19 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/BordersZP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/ChongD06,
  author       = {Daniel J. T. Chong and
                  Robert H. Deng},
  editor       = {Moti Yung and
                  Kaoru Kurosawa and
                  Reihaneh Safavi{-}Naini},
  title        = {Privacy-enhanced superdistribution of layered content with trusted
                  access control},
  booktitle    = {Proceedings of the Sixth {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, October 30, 2006},
  pages        = {37--44},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1179509.1179517},
  doi          = {10.1145/1179509.1179517},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/ChongD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/CooperM06,
  author       = {Andrew Cooper and
                  Andrew P. Martin},
  editor       = {Moti Yung and
                  Kaoru Kurosawa and
                  Reihaneh Safavi{-}Naini},
  title        = {Towards an open, trusted digital rights management platform},
  booktitle    = {Proceedings of the Sixth {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, October 30, 2006},
  pages        = {79--88},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1179509.1179525},
  doi          = {10.1145/1179509.1179525},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/CooperM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/Coria-MendozaNW06,
  author       = {Lino Coria{-}Mendoza and
                  Panos Nasiopoulos and
                  Rabab Kreidieh Ward},
  editor       = {Moti Yung and
                  Kaoru Kurosawa and
                  Reihaneh Safavi{-}Naini},
  title        = {A robust content-dependent algorithm for video watermarking},
  booktitle    = {Proceedings of the Sixth {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, October 30, 2006},
  pages        = {97--101},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1179509.1179528},
  doi          = {10.1145/1179509.1179528},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/Coria-MendozaNW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/JamkhedkarHM06,
  author       = {Pramod A. Jamkhedkar and
                  Gregory L. Heileman and
                  Iv{\'{a}}n Mart{\'{\i}}nez{-}Ortiz},
  editor       = {Moti Yung and
                  Kaoru Kurosawa and
                  Reihaneh Safavi{-}Naini},
  title        = {The problem with rights expression languages},
  booktitle    = {Proceedings of the Sixth {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, October 30, 2006},
  pages        = {59--68},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1179509.1179522},
  doi          = {10.1145/1179509.1179522},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/JamkhedkarHM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/Kalker06,
  author       = {Ton Kalker},
  editor       = {Moti Yung and
                  Kaoru Kurosawa and
                  Reihaneh Safavi{-}Naini},
  title        = {On interoperability of {DRM}},
  booktitle    = {Proceedings of the Sixth {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, October 30, 2006},
  pages        = {45--46},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1179509.1179519},
  doi          = {10.1145/1179509.1179519},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/Kalker06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/KatzenbeisserKT06,
  author       = {Stefan Katzenbeisser and
                  Klaus Kursawe and
                  Joop Talstra},
  editor       = {Moti Yung and
                  Kaoru Kurosawa and
                  Reihaneh Safavi{-}Naini},
  title        = {Graceful infringement reactions in {DRM} systems},
  booktitle    = {Proceedings of the Sixth {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, October 30, 2006},
  pages        = {89--96},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1179509.1179526},
  doi          = {10.1145/1179509.1179526},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/KatzenbeisserKT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/LandauST06,
  author       = {Susan Landau and
                  Ren{\'{e}}e Stratulate and
                  Doug Twilleager},
  editor       = {Moti Yung and
                  Kaoru Kurosawa and
                  Reihaneh Safavi{-}Naini},
  title        = {Consumers, fans, and control: what the games industry can teach Hollywood
                  about {DRM}},
  booktitle    = {Proceedings of the Sixth {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, October 30, 2006},
  pages        = {1--8},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1179509.1179511},
  doi          = {10.1145/1179509.1179511},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/LandauST06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/TabanCG06,
  author       = {Gelareh Taban and
                  Alvaro A. C{\'{a}}rdenas and
                  Virgil D. Gligor},
  editor       = {Moti Yung and
                  Kaoru Kurosawa and
                  Reihaneh Safavi{-}Naini},
  title        = {Towards a secure and interoperable {DRM} architecture},
  booktitle    = {Proceedings of the Sixth {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, October 30, 2006},
  pages        = {69--78},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1179509.1179524},
  doi          = {10.1145/1179509.1179524},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/TabanCG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/TsaiCC06,
  author       = {Janice Y. Tsai and
                  Lorrie Faith Cranor and
                  Scott Craver},
  editor       = {Moti Yung and
                  Kaoru Kurosawa and
                  Reihaneh Safavi{-}Naini},
  title        = {Vicarious infringement creates a privacy ceiling},
  booktitle    = {Proceedings of the Sixth {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, October 30, 2006},
  pages        = {9--18},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1179509.1179512},
  doi          = {10.1145/1179509.1179512},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/TsaiCC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/drm/2006,
  editor       = {Moti Yung and
                  Kaoru Kurosawa and
                  Reihaneh Safavi{-}Naini},
  title        = {Proceedings of the Sixth {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, October 30, 2006},
  publisher    = {{ACM}},
  year         = {2006},
  isbn         = {1-59593-555-X},
  timestamp    = {Thu, 17 Jan 2008 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/AdelsbachRS05,
  author       = {Andr{\'{e}} Adelsbach and
                  Markus Rohe and
                  Ahmad{-}Reza Sadeghi},
  editor       = {Reihaneh Safavi{-}Naini and
                  Moti Yung},
  title        = {Towards multilateral secure digital rights distribution infrastructures},
  booktitle    = {Proceedings of the Fifth {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, November 7, 2005},
  pages        = {45--54},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1102546.1102556},
  doi          = {10.1145/1102546.1102556},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/AdelsbachRS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/ArnabH05,
  author       = {Alapan Arnab and
                  Andrew Hutchison},
  editor       = {Reihaneh Safavi{-}Naini and
                  Moti Yung},
  title        = {Fairer usage contracts for {DRM}},
  booktitle    = {Proceedings of the Fifth {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, November 7, 2005},
  pages        = {1--7},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1102546.1102548},
  doi          = {10.1145/1102546.1102548},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/ArnabH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/GeCT05,
  author       = {Jun Ge and
                  Soma Chaudhuri and
                  Akhilesh Tyagi},
  editor       = {Reihaneh Safavi{-}Naini and
                  Moti Yung},
  title        = {Control flow based obfuscation},
  booktitle    = {Proceedings of the Fifth {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, November 7, 2005},
  pages        = {83--92},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1102546.1102561},
  doi          = {10.1145/1102546.1102561},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/GeCT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/HeilemanJ05,
  author       = {Gregory L. Heileman and
                  Pramod A. Jamkhedkar},
  editor       = {Reihaneh Safavi{-}Naini and
                  Moti Yung},
  title        = {{DRM} interoperability analysis from the perspective of a layered
                  framework},
  booktitle    = {Proceedings of the Fifth {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, November 7, 2005},
  pages        = {17--26},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1102546.1102551},
  doi          = {10.1145/1102546.1102551},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/HeilemanJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/JacksonSBW05,
  author       = {Margaret Jackson and
                  Supriya Singh and
                  Jenine P. Beekhuyzen and
                  Jennifer Waycott},
  editor       = {Reihaneh Safavi{-}Naini and
                  Moti Yung},
  title        = {DRMs, fair use and users' experience of sharing music},
  booktitle    = {Proceedings of the Fifth {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, November 7, 2005},
  pages        = {8--16},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1102546.1102549},
  doi          = {10.1145/1102546.1102549},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/JacksonSBW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/JhoYCK05,
  author       = {Nam{-}Su Jho and
                  Eun Sun Yoo and
                  Jung Hee Cheon and
                  Myung{-}Hwan Kim},
  editor       = {Reihaneh Safavi{-}Naini and
                  Moti Yung},
  title        = {New broadcast encryption scheme using tree-based circle},
  booktitle    = {Proceedings of the Fifth {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, November 7, 2005},
  pages        = {37--44},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1102546.1102554},
  doi          = {10.1145/1102546.1102554},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/JhoYCK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/KravitzM05,
  author       = {David W. Kravitz and
                  Thomas S. Messerges},
  editor       = {Reihaneh Safavi{-}Naini and
                  Moti Yung},
  title        = {Achieving media portability through local content translation and
                  end-to-end rights management},
  booktitle    = {Proceedings of the Fifth {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, November 7, 2005},
  pages        = {27--36},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1102546.1102552},
  doi          = {10.1145/1102546.1102552},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/KravitzM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/MadouASB05,
  author       = {Matias Madou and
                  Bertrand Anckaert and
                  Bjorn De Sutter and
                  Koen De Bosschere},
  editor       = {Reihaneh Safavi{-}Naini and
                  Moti Yung},
  title        = {Hybrid static-dynamic attacks against software protection mechanisms},
  booktitle    = {Proceedings of the Fifth {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, November 7, 2005},
  pages        = {75--82},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1102546.1102560},
  doi          = {10.1145/1102546.1102560},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/MadouASB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/MalikKA05,
  author       = {Hafiz Malik and
                  Ashfaq A. Khokhar and
                  Rashid Ansari},
  editor       = {Reihaneh Safavi{-}Naini and
                  Moti Yung},
  title        = {Improved watermark detection for spread-spectrum based watermarking
                  using independent component analysis},
  booktitle    = {Proceedings of the Fifth {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, November 7, 2005},
  pages        = {102--111},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1102546.1102564},
  doi          = {10.1145/1102546.1102564},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/MalikKA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/Matheus05,
  author       = {Andreas Matheus},
  editor       = {Reihaneh Safavi{-}Naini and
                  Moti Yung},
  title        = {Authorization for digital rights management in the geospatial domain},
  booktitle    = {Proceedings of the Fifth {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, November 7, 2005},
  pages        = {55--64},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1102546.1102557},
  doi          = {10.1145/1102546.1102557},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/Matheus05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/MichielsVJD05,
  author       = {Sam Michiels and
                  Kristof Verslype and
                  Wouter Joosen and
                  Bart De Decker},
  editor       = {Reihaneh Safavi{-}Naini and
                  Moti Yung},
  title        = {Towards a software architecture for {DRM}},
  booktitle    = {Proceedings of the Fifth {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, November 7, 2005},
  pages        = {65--74},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1102546.1102559},
  doi          = {10.1145/1102546.1102559},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/MichielsVJD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/QuanZ05,
  author       = {Xiaomei Quan and
                  Hongbin Zhang},
  editor       = {Reihaneh Safavi{-}Naini and
                  Moti Yung},
  title        = {Statistical audio watermarking algorithm based on perceptual analysis},
  booktitle    = {Proceedings of the Fifth {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, November 7, 2005},
  pages        = {112--118},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1102546.1102565},
  doi          = {10.1145/1102546.1102565},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/QuanZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/SencarM05,
  author       = {Husrev T. Sencar and
                  Nasir D. Memon},
  editor       = {Reihaneh Safavi{-}Naini and
                  Moti Yung},
  title        = {Watermarking and ownership problem: a revisit},
  booktitle    = {Proceedings of the Fifth {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, November 7, 2005},
  pages        = {93--101},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1102546.1102563},
  doi          = {10.1145/1102546.1102563},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/SencarM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/drm/2005,
  editor       = {Reihaneh Safavi{-}Naini and
                  Moti Yung},
  title        = {Proceedings of the Fifth {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, November 7, 2005},
  publisher    = {{ACM}},
  year         = {2005},
  isbn         = {1-59593-230-5},
  timestamp    = {Wed, 22 Feb 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/AnckaertSB04,
  author       = {Bertrand Anckaert and
                  Bjorn De Sutter and
                  Koen De Bosschere},
  editor       = {Aggelos Kiayias and
                  Moti Yung},
  title        = {Software piracy prevention through diversity},
  booktitle    = {Proceedings of the 2004 {ACM} Workshop on Digital Rights Management
                  2004, Washington, DC, USA, October 25, 2004},
  pages        = {63--71},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029146.1029157},
  doi          = {10.1145/1029146.1029157},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/AnckaertSB04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/GhodkeF04,
  author       = {Ninad Ghodke and
                  Renato J. O. Figueiredo},
  editor       = {Aggelos Kiayias and
                  Moti Yung},
  title        = {On the implications of machine virtualization for {DRM} and fair use:
                  a case study of a virtual audio device driver},
  booktitle    = {Proceedings of the 2004 {ACM} Workshop on Digital Rights Management
                  2004, Washington, DC, USA, October 25, 2004},
  pages        = {91--98},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029146.1029162},
  doi          = {10.1145/1029146.1029162},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/GhodkeF04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/JamkhedkarH04,
  author       = {Pramod A. Jamkhedkar and
                  Gregory L. Heileman},
  editor       = {Aggelos Kiayias and
                  Moti Yung},
  title        = {{DRM} as a layered system},
  booktitle    = {Proceedings of the 2004 {ACM} Workshop on Digital Rights Management
                  2004, Washington, DC, USA, October 25, 2004},
  pages        = {11--21},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029146.1029151},
  doi          = {10.1145/1029146.1029151},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/JamkhedkarH04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/JinLN04,
  author       = {Hongxia Jin and
                  Jeffery Lotspiech and
                  Stefan Nusser},
  editor       = {Aggelos Kiayias and
                  Moti Yung},
  title        = {Traitor tracing for prerecorded and recordable media},
  booktitle    = {Proceedings of the 2004 {ACM} Workshop on Digital Rights Management
                  2004, Washington, DC, USA, October 25, 2004},
  pages        = {83--90},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029146.1029160},
  doi          = {10.1145/1029146.1029160},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/JinLN04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/LiGJ04,
  author       = {Yingjiu Li and
                  Huiping Guo and
                  Sushil Jajodia},
  editor       = {Aggelos Kiayias and
                  Moti Yung},
  title        = {Tamper detection and localization for categorical data using fragile
                  watermarks},
  booktitle    = {Proceedings of the 2004 {ACM} Workshop on Digital Rights Management
                  2004, Washington, DC, USA, October 25, 2004},
  pages        = {73--82},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029146.1029159},
  doi          = {10.1145/1029146.1029159},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/LiGJ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/MargolinWL04,
  author       = {N. Boris Margolin and
                  Matthew K. Wright and
                  Brian Neil Levine},
  editor       = {Aggelos Kiayias and
                  Moti Yung},
  title        = {Analysis of an incentives-based secrets protection system},
  booktitle    = {Proceedings of the 2004 {ACM} Workshop on Digital Rights Management
                  2004, Washington, DC, USA, October 25, 2004},
  pages        = {22--30},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029146.1029153},
  doi          = {10.1145/1029146.1029153},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/MargolinWL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/PopescuCTK04,
  author       = {Bogdan C. Popescu and
                  Bruno Crispo and
                  Andrew S. Tanenbaum and
                  Frank Kamperman},
  editor       = {Aggelos Kiayias and
                  Moti Yung},
  title        = {A {DRM} security architecture for home networks},
  booktitle    = {Proceedings of the 2004 {ACM} Workshop on Digital Rights Management
                  2004, Washington, DC, USA, October 25, 2004},
  pages        = {1--10},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029146.1029150},
  doi          = {10.1145/1029146.1029150},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/PopescuCTK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/RouvroySLQML04,
  author       = {Ga{\"{e}}l Rouvroy and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Fr{\'{e}}d{\'{e}}ric Lef{\`{e}}bvre and
                  Jean{-}Jacques Quisquater and
                  Beno{\^{\i}}t Macq and
                  Jean{-}Didier Legat},
  editor       = {Aggelos Kiayias and
                  Moti Yung},
  title        = {Reconfigurable hardware solutions for the digital rights management
                  of digital cinema},
  booktitle    = {Proceedings of the 2004 {ACM} Workshop on Digital Rights Management
                  2004, Washington, DC, USA, October 25, 2004},
  pages        = {40--53},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029146.1029147},
  doi          = {10.1145/1029146.1029147},
  timestamp    = {Mon, 15 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/RouvroySLQML04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/Safavi-Naini04,
  author       = {Reihaneh Safavi{-}Naini},
  editor       = {Aggelos Kiayias and
                  Moti Yung},
  title        = {Tracing traitors: a selective survey},
  booktitle    = {Proceedings of the 2004 {ACM} Workshop on Digital Rights Management
                  2004, Washington, DC, USA, October 25, 2004},
  pages        = {72},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029146.1029148},
  doi          = {10.1145/1029146.1029148},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/Safavi-Naini04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/Safavi-NainiSU04,
  author       = {Reihaneh Safavi{-}Naini and
                  Nicholas Paul Sheppard and
                  Takeyuki Uehara},
  editor       = {Aggelos Kiayias and
                  Moti Yung},
  title        = {Import/export in digital rights management},
  booktitle    = {Proceedings of the 2004 {ACM} Workshop on Digital Rights Management
                  2004, Washington, DC, USA, October 25, 2004},
  pages        = {99--110},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029146.1029163},
  doi          = {10.1145/1029146.1029163},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/Safavi-NainiSU04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/ShiLLZ04,
  author       = {Weidong Shi and
                  Hsien{-}Hsin S. Lee and
                  Chenghuai Lu and
                  Tao Zhang},
  editor       = {Aggelos Kiayias and
                  Moti Yung},
  title        = {Attacks and risk analysis for hardware supported software copy protection
                  systems},
  booktitle    = {Proceedings of the 2004 {ACM} Workshop on Digital Rights Management
                  2004, Washington, DC, USA, October 25, 2004},
  pages        = {54--62},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029146.1029156},
  doi          = {10.1145/1029146.1029156},
  timestamp    = {Thu, 14 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/ShiLLZ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/YuC04,
  author       = {Yang Yu and
                  Tzi{-}cker Chiueh},
  editor       = {Aggelos Kiayias and
                  Moti Yung},
  title        = {Display-only file server: a solution against information theft due
                  to insider attack},
  booktitle    = {Proceedings of the 2004 {ACM} Workshop on Digital Rights Management
                  2004, Washington, DC, USA, October 25, 2004},
  pages        = {31--39},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029146.1029154},
  doi          = {10.1145/1029146.1029154},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/YuC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/drm/2004,
  editor       = {Aggelos Kiayias and
                  Moti Yung},
  title        = {Proceedings of the 2004 {ACM} Workshop on Digital Rights Management
                  2004, Washington, DC, USA, October 25, 2004},
  publisher    = {{ACM}},
  year         = {2004},
  isbn         = {1-58113-969-1},
  timestamp    = {Wed, 15 Dec 2004 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/AdelsbachKV03,
  author       = {Andr{\'{e}} Adelsbach and
                  Stefan Katzenbeisser and
                  Helmut Veith},
  editor       = {Moti Yung},
  title        = {Watermarking schemes provably secure against copy and ambiguity attacks},
  booktitle    = {Proceedings of the 2003 {ACM} workshop on Digital rights management
                  2003, Washington, DC, USA, October 27, 2003},
  pages        = {111--119},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/947380.947395},
  doi          = {10.1145/947380.947395},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/AdelsbachKV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/AttrapadungK03,
  author       = {Nuttapong Attrapadung and
                  Kazukuni Kobara and
                  Hideki Imai},
  editor       = {Moti Yung},
  title        = {Broadcast encryption with short keys and transmissions},
  booktitle    = {Proceedings of the 2003 {ACM} workshop on Digital rights management
                  2003, Washington, DC, USA, October 27, 2003},
  pages        = {55--66},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/947380.947388},
  doi          = {10.1145/947380.947388},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/AttrapadungK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/ByersCKMC03,
  author       = {Simon D. Byers and
                  Lorrie Faith Cranor and
                  David P. Kormann and
                  Patrick D. McDaniel and
                  Eric Cronin},
  editor       = {Moti Yung},
  title        = {Analysis of security vulnerabilities in the movie production and distribution
                  process},
  booktitle    = {Proceedings of the 2003 {ACM} workshop on Digital rights management
                  2003, Washington, DC, USA, October 27, 2003},
  pages        = {1--12},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/947380.947383},
  doi          = {10.1145/947380.947383},
  timestamp    = {Thu, 05 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/ByersCKMC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/DodisR03,
  author       = {Yevgeniy Dodis and
                  Leonid Reyzin},
  editor       = {Moti Yung},
  title        = {Breaking and repairing optimistic fair exchange from {PODC} 2003},
  booktitle    = {Proceedings of the 2003 {ACM} workshop on Digital rights management
                  2003, Washington, DC, USA, October 27, 2003},
  pages        = {47--54},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/947380.947387},
  doi          = {10.1145/947380.947387},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/DodisR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/GalSP03,
  author       = {Tsvi Gal and
                  Howard M. Singer and
                  Laird Popkin},
  editor       = {Moti Yung},
  title        = {The {IP} war: apocalypse or revolution?},
  booktitle    = {Proceedings of the 2003 {ACM} workshop on Digital rights management
                  2003, Washington, DC, USA, October 27, 2003},
  pages        = {39--46},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/947380.947381},
  doi          = {10.1145/947380.947381},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/GalSP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/GuthNS03,
  author       = {Susanne Guth and
                  Gustaf Neumann and
                  Mark Strembeck},
  editor       = {Moti Yung},
  title        = {Experiences with the enforcement of access rights extracted from ODRL-based
                  digital contracts},
  booktitle    = {Proceedings of the 2003 {ACM} workshop on Digital rights management
                  2003, Washington, DC, USA, October 27, 2003},
  pages        = {90--102},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/947380.947392},
  doi          = {10.1145/947380.947392},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/GuthNS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/HeilemanY03,
  author       = {Gregory L. Heileman and
                  Yunlong Yang},
  editor       = {Moti Yung},
  title        = {The effects of invisible watermarking on satellite image classification},
  booktitle    = {Proceedings of the 2003 {ACM} workshop on Digital rights management
                  2003, Washington, DC, USA, October 27, 2003},
  pages        = {120--132},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/947380.947396},
  doi          = {10.1145/947380.947396},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/HeilemanY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/LiSJ03,
  author       = {Yingjiu Li and
                  Vipin Swarup and
                  Sushil Jajodia},
  editor       = {Moti Yung},
  title        = {Constructing a virtual primary key for fingerprinting relational data},
  booktitle    = {Proceedings of the 2003 {ACM} workshop on Digital rights management
                  2003, Washington, DC, USA, October 27, 2003},
  pages        = {133--141},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/947380.947398},
  doi          = {10.1145/947380.947398},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/LiSJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/MessergesD03,
  author       = {Thomas S. Messerges and
                  Ezzat A. Dabbish},
  editor       = {Moti Yung},
  title        = {Digital rights management in a 3G mobile phone and beyond},
  booktitle    = {Proceedings of the 2003 {ACM} workshop on Digital rights management
                  2003, Washington, DC, USA, October 27, 2003},
  pages        = {27--38},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/947380.947385},
  doi          = {10.1145/947380.947385},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/MessergesD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/MulliganHB03,
  author       = {Deirdre K. Mulligan and
                  John Han and
                  Aaron J. Burstein},
  editor       = {Moti Yung},
  title        = {How DRM-based content delivery systems disrupt expectations of "personal
                  use"},
  booktitle    = {Proceedings of the 2003 {ACM} workshop on Digital rights management
                  2003, Washington, DC, USA, October 27, 2003},
  pages        = {77--89},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/947380.947391},
  doi          = {10.1145/947380.947391},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/MulliganHB03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/NicolakisPPW03,
  author       = {Howard Goldstein and
                  Gregory L. Heileman and
                  Mark D. Heileman and
                  Theo Nicolakis and
                  Carlos E. Pizano and
                  Bianca Prumo and
                  Mitchell Webb},
  editor       = {Moti Yung},
  title        = {Protecting digital archives at the Greek Orthodox Archdiocese of America},
  booktitle    = {Proceedings of the 2003 {ACM} workshop on Digital rights management
                  2003, Washington, DC, USA, October 27, 2003},
  pages        = {13--26},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/947380.947384},
  doi          = {10.1145/947380.947384},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/NicolakisPPW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/SosonkinNM03,
  author       = {Mikhail Sosonkin and
                  Gleb Naumovich and
                  Nasir D. Memon},
  editor       = {Moti Yung},
  title        = {Obfuscation of design intent in object-oriented applications},
  booktitle    = {Proceedings of the 2003 {ACM} workshop on Digital rights management
                  2003, Washington, DC, USA, October 27, 2003},
  pages        = {142--153},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/947380.947399},
  doi          = {10.1145/947380.947399},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/SosonkinNM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/ToSZ03,
  author       = {Vu Dong T{\^{o}} and
                  Reihaneh Safavi{-}Naini and
                  Fangguo Zhang},
  editor       = {Moti Yung},
  title        = {New traitor tracing schemes using bilinear map},
  booktitle    = {Proceedings of the 2003 {ACM} workshop on Digital rights management
                  2003, Washington, DC, USA, October 27, 2003},
  pages        = {67--76},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/947380.947389},
  doi          = {10.1145/947380.947389},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/ToSZ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/UzunerD03,
  author       = {{\"{O}}zlem Uzuner and
                  Randall Davis},
  editor       = {Moti Yung},
  title        = {Content and expression-based copy recognition for intellectual property
                  protection},
  booktitle    = {Proceedings of the 2003 {ACM} workshop on Digital rights management
                  2003, Washington, DC, USA, October 27, 2003},
  pages        = {103--110},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/947380.947393},
  doi          = {10.1145/947380.947393},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/UzunerD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:conf/drm/Bauckhage03,
  author       = {Tobias Bauckhage},
  editor       = {Eberhard Becker and
                  Willms Buhse and
                  Dirk G{\"{u}}nnewig and
                  Niels Rump},
  title        = {The Basic Economic Theory of Copying},
  booktitle    = {Digital Rights Management - Technological, Economic, Legal and Political
                  Aspects},
  series       = {Lecture Notes in Computer Science},
  volume       = {2770},
  pages        = {234--249},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10941270\_16},
  doi          = {10.1007/10941270\_16},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/Bauckhage03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:conf/drm/Bechtold03,
  author       = {Stefan Bechtold},
  editor       = {Eberhard Becker and
                  Willms Buhse and
                  Dirk G{\"{u}}nnewig and
                  Niels Rump},
  title        = {The Present and Future of {DRM} - Musings on Emerging Legal Problems},
  booktitle    = {Digital Rights Management - Technological, Economic, Legal and Political
                  Aspects},
  series       = {Lecture Notes in Computer Science},
  volume       = {2770},
  pages        = {597--654},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10941270\_36},
  doi          = {10.1007/10941270\_36},
  timestamp    = {Fri, 29 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/Bechtold03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:conf/drm/BeckerBGR03,
  author       = {Eberhard Becker and
                  Willms Buhse and
                  Dirk G{\"{u}}nnewig and
                  Niels Rump},
  editor       = {Eberhard Becker and
                  Willms Buhse and
                  Dirk G{\"{u}}nnewig and
                  Niels Rump},
  title        = {{DRM} as Interlocking Challenge for Different Scientific Disciplines:
                  Introduction},
  booktitle    = {Digital Rights Management - Technological, Economic, Legal and Political
                  Aspects},
  series       = {Lecture Notes in Computer Science},
  volume       = {2770},
  pages        = {1--2},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10941270\_1},
  doi          = {10.1007/10941270\_1},
  timestamp    = {Fri, 29 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/BeckerBGR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:conf/drm/BeckerG03,
  author       = {Eberhard Becker and
                  Dirk G{\"{u}}nnewig},
  editor       = {Eberhard Becker and
                  Willms Buhse and
                  Dirk G{\"{u}}nnewig and
                  Niels Rump},
  title        = {Getting Insights: {DRM} Conferences 2000 and 2002},
  booktitle    = {Digital Rights Management - Technological, Economic, Legal and Political
                  Aspects},
  series       = {Lecture Notes in Computer Science},
  volume       = {2770},
  pages        = {655--656},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10941270\_37},
  doi          = {10.1007/10941270\_37},
  timestamp    = {Fri, 29 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/BeckerG03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:conf/drm/BeckerG03a,
  author       = {Eberhard Becker and
                  Dirk G{\"{u}}nnewig},
  editor       = {Eberhard Becker and
                  Willms Buhse and
                  Dirk G{\"{u}}nnewig and
                  Niels Rump},
  title        = {{DRM} Workshop 2000: Summary},
  booktitle    = {Digital Rights Management - Technological, Economic, Legal and Political
                  Aspects},
  series       = {Lecture Notes in Computer Science},
  volume       = {2770},
  pages        = {657--663},
  publisher    = {Springer},
  year         = {2003},
  timestamp    = {Fri, 29 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/BeckerG03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:conf/drm/BeckerG03b,
  author       = {Eberhard Becker and
                  Dirk G{\"{u}}nnewig},
  editor       = {Eberhard Becker and
                  Willms Buhse and
                  Dirk G{\"{u}}nnewig and
                  Niels Rump},
  title        = {{DRM} Conference 2002: Summary},
  booktitle    = {Digital Rights Management - Technological, Economic, Legal and Political
                  Aspects},
  series       = {Lecture Notes in Computer Science},
  volume       = {2770},
  pages        = {664--684},
  publisher    = {Springer},
  year         = {2003},
  timestamp    = {Fri, 29 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/BeckerG03b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:conf/drm/BiddleEPW03,
  author       = {Peter Biddle and
                  Paul England and
                  Marcus Peinado and
                  Bryan Willman},
  editor       = {Eberhard Becker and
                  Willms Buhse and
                  Dirk G{\"{u}}nnewig and
                  Niels Rump},
  title        = {The Darknet and the Future of Content Protection},
  booktitle    = {Digital Rights Management - Technological, Economic, Legal and Political
                  Aspects},
  series       = {Lecture Notes in Computer Science},
  volume       = {2770},
  pages        = {344--365},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10941270\_23},
  doi          = {10.1007/10941270\_23},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/BiddleEPW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:conf/drm/Bohm03,
  author       = {Bettina B{\"{o}}hm},
  editor       = {Eberhard Becker and
                  Willms Buhse and
                  Dirk G{\"{u}}nnewig and
                  Niels Rump},
  title        = {Implementation of the European Info Directive in German Law and Its
                  Consequences for Teaching and Research},
  booktitle    = {Digital Rights Management - Technological, Economic, Legal and Political
                  Aspects},
  series       = {Lecture Notes in Computer Science},
  volume       = {2770},
  pages        = {520--527},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10941270\_32},
  doi          = {10.1007/10941270\_32},
  timestamp    = {Fri, 29 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/Bohm03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:conf/drm/BremerB03,
  author       = {Oliver Bremer and
                  Willms Buhse},
  editor       = {Eberhard Becker and
                  Willms Buhse and
                  Dirk G{\"{u}}nnewig and
                  Niels Rump},
  title        = {Standardization in {DRM} - Trends and Recommendations},
  booktitle    = {Digital Rights Management - Technological, Economic, Legal and Political
                  Aspects},
  series       = {Lecture Notes in Computer Science},
  volume       = {2770},
  pages        = {334--343},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10941270\_22},
  doi          = {10.1007/10941270\_22},
  timestamp    = {Fri, 29 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/BremerB03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:conf/drm/BuhseW03,
  author       = {Willms Buhse and
                  Am{\'{e}}lie Wetzel},
  editor       = {Eberhard Becker and
                  Willms Buhse and
                  Dirk G{\"{u}}nnewig and
                  Niels Rump},
  title        = {Creating a Framework for Business Models for Digital Content - Mobile
                  Music as Case Study},
  booktitle    = {Digital Rights Management - Technological, Economic, Legal and Political
                  Aspects},
  series       = {Lecture Notes in Computer Science},
  volume       = {2770},
  pages        = {271--287},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10941270\_18},
  doi          = {10.1007/10941270\_18},
  timestamp    = {Fri, 29 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/BuhseW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:conf/drm/Bygrave03,
  author       = {Lee A. Bygrave},
  editor       = {Eberhard Becker and
                  Willms Buhse and
                  Dirk G{\"{u}}nnewig and
                  Niels Rump},
  title        = {{DRM} and Privacy - Legal Aspects in the European Union},
  booktitle    = {Digital Rights Management - Technological, Economic, Legal and Political
                  Aspects},
  series       = {Lecture Notes in Computer Science},
  volume       = {2770},
  pages        = {418--446},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10941270\_27},
  doi          = {10.1007/10941270\_27},
  timestamp    = {Fri, 29 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/Bygrave03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:conf/drm/ChengR03,
  author       = {Spencer Cheng and
                  Avni Rambhia},
  editor       = {Eberhard Becker and
                  Willms Buhse and
                  Dirk G{\"{u}}nnewig and
                  Niels Rump},
  title        = {{DRM} and Standardization - Can {DRM} Be Standardized?},
  booktitle    = {Digital Rights Management - Technological, Economic, Legal and Political
                  Aspects},
  series       = {Lecture Notes in Computer Science},
  volume       = {2770},
  pages        = {162--177},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10941270\_12},
  doi          = {10.1007/10941270\_12},
  timestamp    = {Fri, 29 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/ChengR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:conf/drm/Clement03,
  author       = {Michel Clement},
  editor       = {Eberhard Becker and
                  Willms Buhse and
                  Dirk G{\"{u}}nnewig and
                  Niels Rump},
  title        = {Lessons from Content-for-Free Distribution Channels},
  booktitle    = {Digital Rights Management - Technological, Economic, Legal and Political
                  Aspects},
  series       = {Lecture Notes in Computer Science},
  volume       = {2770},
  pages        = {321--333},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10941270\_21},
  doi          = {10.1007/10941270\_21},
  timestamp    = {Fri, 29 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/Clement03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:conf/drm/DreierN03,
  author       = {Thomas Dreier and
                  Georg Nolte},
  editor       = {Eberhard Becker and
                  Willms Buhse and
                  Dirk G{\"{u}}nnewig and
                  Niels Rump},
  title        = {The German Copyright - Yesterday, Today, Tomorrow},
  booktitle    = {Digital Rights Management - Technological, Economic, Legal and Political
                  Aspects},
  series       = {Lecture Notes in Computer Science},
  volume       = {2770},
  pages        = {479--501},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10941270\_30},
  doi          = {10.1007/10941270\_30},
  timestamp    = {Fri, 29 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/DreierN03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:conf/drm/Dusollier03,
  author       = {S{\'{e}}verine Dusollier},
  editor       = {Eberhard Becker and
                  Willms Buhse and
                  Dirk G{\"{u}}nnewig and
                  Niels Rump},
  title        = {Tipping the Scale in Favor of the Right Holders: The European Anti-Circumvention
                  Provisions},
  booktitle    = {Digital Rights Management - Technological, Economic, Legal and Political
                  Aspects},
  series       = {Lecture Notes in Computer Science},
  volume       = {2770},
  pages        = {462--478},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10941270\_29},
  doi          = {10.1007/10941270\_29},
  timestamp    = {Fri, 29 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/Dusollier03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:conf/drm/Fetscherin03,
  author       = {Marc Fetscherin},
  editor       = {Eberhard Becker and
                  Willms Buhse and
                  Dirk G{\"{u}}nnewig and
                  Niels Rump},
  title        = {Evaluating Consumer Acceptance for Protected Digital Content},
  booktitle    = {Digital Rights Management - Technological, Economic, Legal and Political
                  Aspects},
  series       = {Lecture Notes in Computer Science},
  volume       = {2770},
  pages        = {321--333},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10941270\_20},
  doi          = {10.1007/10941270\_20},
  timestamp    = {Fri, 29 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/Fetscherin03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:conf/drm/Goldmann03,
  author       = {Bettina Goldmann},
  editor       = {Eberhard Becker and
                  Willms Buhse and
                  Dirk G{\"{u}}nnewig and
                  Niels Rump},
  title        = {Copy Protection by {DRM} in the {EU} and Germany: Legal Aspects},
  booktitle    = {Digital Rights Management - Technological, Economic, Legal and Political
                  Aspects},
  series       = {Lecture Notes in Computer Science},
  volume       = {2770},
  pages        = {502--519},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10941270\_31},
  doi          = {10.1007/10941270\_31},
  timestamp    = {Fri, 29 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/Goldmann03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:conf/drm/Gooch03,
  author       = {Richard Gooch},
  editor       = {Eberhard Becker and
                  Willms Buhse and
                  Dirk G{\"{u}}nnewig and
                  Niels Rump},
  title        = {Requirements for {DRM} Systems},
  booktitle    = {Digital Rights Management - Technological, Economic, Legal and Political
                  Aspects},
  series       = {Lecture Notes in Computer Science},
  volume       = {2770},
  pages        = {16--25},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10941270\_3},
  doi          = {10.1007/10941270\_3},
  timestamp    = {Fri, 29 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/Gooch03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:conf/drm/Gunnewig03,
  author       = {Dirk G{\"{u}}nnewig},
  editor       = {Eberhard Becker and
                  Willms Buhse and
                  Dirk G{\"{u}}nnewig and
                  Niels Rump},
  title        = {New Copyright for the Digital Age: Political Conflicts in Germany},
  booktitle    = {Digital Rights Management - Technological, Economic, Legal and Political
                  Aspects},
  series       = {Lecture Notes in Computer Science},
  volume       = {2770},
  pages        = {528--573},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10941270\_33},
  doi          = {10.1007/10941270\_33},
  timestamp    = {Fri, 29 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/Gunnewig03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:conf/drm/Guth03,
  author       = {Susanne Guth},
  editor       = {Eberhard Becker and
                  Willms Buhse and
                  Dirk G{\"{u}}nnewig and
                  Niels Rump},
  title        = {Rights Expression Languages},
  booktitle    = {Digital Rights Management - Technological, Economic, Legal and Political
                  Aspects},
  series       = {Lecture Notes in Computer Science},
  volume       = {2770},
  pages        = {101--112},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10941270\_8},
  doi          = {10.1007/10941270\_8},
  timestamp    = {Fri, 29 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/Guth03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:conf/drm/Guth03a,
  author       = {Susanne Guth},
  editor       = {Eberhard Becker and
                  Willms Buhse and
                  Dirk G{\"{u}}nnewig and
                  Niels Rump},
  title        = {A Sample {DRM} System},
  booktitle    = {Digital Rights Management - Technological, Economic, Legal and Political
                  Aspects},
  series       = {Lecture Notes in Computer Science},
  volume       = {2770},
  pages        = {150--161},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10941270\_11},
  doi          = {10.1007/10941270\_11},
  timestamp    = {Fri, 29 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/Guth03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:conf/drm/HaberHPST03,
  author       = {Stuart Haber and
                  Bill G. Horne and
                  Joe Pato and
                  Tomas Sander and
                  Robert Endre Tarjan},
  editor       = {Eberhard Becker and
                  Willms Buhse and
                  Dirk G{\"{u}}nnewig and
                  Niels Rump},
  title        = {If Piracy Is the Problem, Is {DRM} the Answer?},
  booktitle    = {Digital Rights Management - Technological, Economic, Legal and Political
                  Aspects},
  series       = {Lecture Notes in Computer Science},
  volume       = {2770},
  pages        = {224--233},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10941270\_15},
  doi          = {10.1007/10941270\_15},
  timestamp    = {Fri, 29 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/HaberHPST03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:conf/drm/Hartung03,
  author       = {Frank Hartung},
  editor       = {Eberhard Becker and
                  Willms Buhse and
                  Dirk G{\"{u}}nnewig and
                  Niels Rump},
  title        = {Mobile {DRM}},
  booktitle    = {Digital Rights Management - Technological, Economic, Legal and Political
                  Aspects},
  series       = {Lecture Notes in Computer Science},
  volume       = {2770},
  pages        = {138--149},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10941270\_10},
  doi          = {10.1007/10941270\_10},
  timestamp    = {Fri, 29 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/Hartung03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:conf/drm/HauserW03,
  author       = {Tobias Hauser and
                  Christian Wenz},
  editor       = {Eberhard Becker and
                  Willms Buhse and
                  Dirk G{\"{u}}nnewig and
                  Niels Rump},
  title        = {{DRM} Under Attack: Weaknesses in Existing Systems},
  booktitle    = {Digital Rights Management - Technological, Economic, Legal and Political
                  Aspects},
  series       = {Lecture Notes in Computer Science},
  volume       = {2770},
  pages        = {206--223},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10941270\_14},
  doi          = {10.1007/10941270\_14},
  timestamp    = {Fri, 29 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/HauserW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:conf/drm/Herre03,
  author       = {J{\"{u}}rgen Herre},
  editor       = {Eberhard Becker and
                  Willms Buhse and
                  Dirk G{\"{u}}nnewig and
                  Niels Rump},
  title        = {Content Based Identification (Fingerprinting)},
  booktitle    = {Digital Rights Management - Technological, Economic, Legal and Political
                  Aspects},
  series       = {Lecture Notes in Computer Science},
  volume       = {2770},
  pages        = {93--100},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10941270\_7},
  doi          = {10.1007/10941270\_7},
  timestamp    = {Fri, 29 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/Herre03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:conf/drm/Hoeren03,
  author       = {Thomas Hoeren},
  editor       = {Eberhard Becker and
                  Willms Buhse and
                  Dirk G{\"{u}}nnewig and
                  Niels Rump},
  title        = {Copyright Dilemma: Access Right as a Postmodern Symbol of Copyright
                  Deconstruction?},
  booktitle    = {Digital Rights Management - Technological, Economic, Legal and Political
                  Aspects},
  series       = {Lecture Notes in Computer Science},
  volume       = {2770},
  pages        = {574--586},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10941270\_34},
  doi          = {10.1007/10941270\_34},
  timestamp    = {Fri, 29 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/Hoeren03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:conf/drm/KuhlmannG03,
  author       = {Dirk Kuhlmann and
                  Robert A. Gehring},
  editor       = {Eberhard Becker and
                  Willms Buhse and
                  Dirk G{\"{u}}nnewig and
                  Niels Rump},
  title        = {Trusted Platforms, DRM, and Beyond},
  booktitle    = {Digital Rights Management - Technological, Economic, Legal and Political
                  Aspects},
  series       = {Lecture Notes in Computer Science},
  volume       = {2770},
  pages        = {178--205},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10941270\_13},
  doi          = {10.1007/10941270\_13},
  timestamp    = {Fri, 29 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/KuhlmannG03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:conf/drm/Lejeune03,
  author       = {Mathias Lejeune},
  editor       = {Eberhard Becker and
                  Willms Buhse and
                  Dirk G{\"{u}}nnewig and
                  Niels Rump},
  title        = {Protection under {US} Copyright Law},
  booktitle    = {Digital Rights Management - Technological, Economic, Legal and Political
                  Aspects},
  series       = {Lecture Notes in Computer Science},
  volume       = {2770},
  pages        = {366--382},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10941270\_24},
  doi          = {10.1007/10941270\_24},
  timestamp    = {Fri, 29 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/Lejeune03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:conf/drm/Paskin03,
  author       = {Norman Paskin},
  editor       = {Eberhard Becker and
                  Willms Buhse and
                  Dirk G{\"{u}}nnewig and
                  Niels Rump},
  title        = {Identification and Metadata},
  booktitle    = {Digital Rights Management - Technological, Economic, Legal and Political
                  Aspects},
  series       = {Lecture Notes in Computer Science},
  volume       = {2770},
  pages        = {26--61},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10941270\_4},
  doi          = {10.1007/10941270\_4},
  timestamp    = {Fri, 29 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/Paskin03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:conf/drm/Petitcolas03,
  author       = {Fabien A. P. Petitcolas},
  editor       = {Eberhard Becker and
                  Willms Buhse and
                  Dirk G{\"{u}}nnewig and
                  Niels Rump},
  title        = {Digital Watermarking},
  booktitle    = {Digital Rights Management - Technological, Economic, Legal and Political
                  Aspects},
  series       = {Lecture Notes in Computer Science},
  volume       = {2770},
  pages        = {81--92},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10941270\_6},
  doi          = {10.1007/10941270\_6},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/Petitcolas03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:conf/drm/PicotF03,
  author       = {Arnold Picot and
                  Marina Fiedler},
  editor       = {Eberhard Becker and
                  Willms Buhse and
                  Dirk G{\"{u}}nnewig and
                  Niels Rump},
  title        = {Impacts of {DRM} on Internet Based Innovation},
  booktitle    = {Digital Rights Management - Technological, Economic, Legal and Political
                  Aspects},
  series       = {Lecture Notes in Computer Science},
  volume       = {2770},
  pages        = {288--300},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10941270\_19},
  doi          = {10.1007/10941270\_19},
  timestamp    = {Fri, 29 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/PicotF03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:conf/drm/Reinbothe03,
  author       = {J{\"{o}}rg Reinbothe},
  editor       = {Eberhard Becker and
                  Willms Buhse and
                  Dirk G{\"{u}}nnewig and
                  Niels Rump},
  title        = {European Copyright - Yesterday, Today, Tomorrow},
  booktitle    = {Digital Rights Management - Technological, Economic, Legal and Political
                  Aspects},
  series       = {Lecture Notes in Computer Science},
  volume       = {2770},
  pages        = {405--417},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10941270\_26},
  doi          = {10.1007/10941270\_26},
  timestamp    = {Fri, 29 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/Reinbothe03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:conf/drm/Rump03,
  author       = {Niels Rump},
  editor       = {Eberhard Becker and
                  Willms Buhse and
                  Dirk G{\"{u}}nnewig and
                  Niels Rump},
  title        = {Definition, Aspects, and Overview},
  booktitle    = {Digital Rights Management - Technological, Economic, Legal and Political
                  Aspects},
  series       = {Lecture Notes in Computer Science},
  volume       = {2770},
  pages        = {3--15},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10941270\_2},
  doi          = {10.1007/10941270\_2},
  timestamp    = {Fri, 29 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/Rump03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:conf/drm/SadeghiS03,
  author       = {Ahmad{-}Reza Sadeghi and
                  Markus Schneider},
  editor       = {Eberhard Becker and
                  Willms Buhse and
                  Dirk G{\"{u}}nnewig and
                  Niels Rump},
  title        = {Electronic Payment Systems},
  booktitle    = {Digital Rights Management - Technological, Economic, Legal and Political
                  Aspects},
  series       = {Lecture Notes in Computer Science},
  volume       = {2770},
  pages        = {113--137},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10941270\_9},
  doi          = {10.1007/10941270\_9},
  timestamp    = {Fri, 29 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/SadeghiS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:conf/drm/Simons03,
  author       = {Barbara Simons},
  editor       = {Eberhard Becker and
                  Willms Buhse and
                  Dirk G{\"{u}}nnewig and
                  Niels Rump},
  title        = {The Copyright Wars - {A} Computer Scientist's View of Copyright in
                  the U. S.},
  booktitle    = {Digital Rights Management - Technological, Economic, Legal and Political
                  Aspects},
  series       = {Lecture Notes in Computer Science},
  volume       = {2770},
  pages        = {383--404},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10941270\_25},
  doi          = {10.1007/10941270\_25},
  timestamp    = {Fri, 29 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/Simons03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:conf/drm/Spenger03,
  author       = {Gabriele Spenger},
  editor       = {Eberhard Becker and
                  Willms Buhse and
                  Dirk G{\"{u}}nnewig and
                  Niels Rump},
  title        = {Authentication, Identification Techniques, and Secure Containers -
                  Baseline Technologies},
  booktitle    = {Digital Rights Management - Technological, Economic, Legal and Political
                  Aspects},
  series       = {Lecture Notes in Computer Science},
  volume       = {2770},
  pages        = {62--80},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10941270\_5},
  doi          = {10.1007/10941270\_5},
  timestamp    = {Fri, 29 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/Spenger03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:conf/drm/Ulbricht03,
  author       = {Johannes Ulbricht},
  editor       = {Eberhard Becker and
                  Willms Buhse and
                  Dirk G{\"{u}}nnewig and
                  Niels Rump},
  title        = {Business, Technology, and Law - Interrelations of Three Scientific
                  Perspectives on {DRM}},
  booktitle    = {Digital Rights Management - Technological, Economic, Legal and Political
                  Aspects},
  series       = {Lecture Notes in Computer Science},
  volume       = {2770},
  pages        = {587--596},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10941270\_35},
  doi          = {10.1007/10941270\_35},
  timestamp    = {Fri, 29 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/Ulbricht03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:conf/drm/Ulmer-Eilfort03,
  author       = {Constanze Ulmer{-}Eilfort},
  editor       = {Eberhard Becker and
                  Willms Buhse and
                  Dirk G{\"{u}}nnewig and
                  Niels Rump},
  title        = {Private Copying and Levies for Information- and Communication-Technologies
                  and Storage Media in Europe},
  booktitle    = {Digital Rights Management - Technological, Economic, Legal and Political
                  Aspects},
  series       = {Lecture Notes in Computer Science},
  volume       = {2770},
  pages        = {447--461},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10941270\_28},
  doi          = {10.1007/10941270\_28},
  timestamp    = {Fri, 29 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/Ulmer-Eilfort03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:conf/drm/Wigand03,
  author       = {Rolf T. Wigand},
  editor       = {Eberhard Becker and
                  Willms Buhse and
                  Dirk G{\"{u}}nnewig and
                  Niels Rump},
  title        = {Facing the Music: Value-Driven Electronic Markets, Networks and Value
                  Webs in Economic Integration of Digital Products},
  booktitle    = {Digital Rights Management - Technological, Economic, Legal and Political
                  Aspects},
  series       = {Lecture Notes in Computer Science},
  volume       = {2770},
  pages        = {250--270},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10941270\_17},
  doi          = {10.1007/10941270\_17},
  timestamp    = {Fri, 29 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/Wigand03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2002drm,
  editor       = {Joan Feigenbaum},
  title        = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop,
                  {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2696},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/b11725},
  doi          = {10.1007/B11725},
  isbn         = {3-540-40410-4},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2002drm.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:conf/drm/2003,
  editor       = {Eberhard Becker and
                  Willms Buhse and
                  Dirk G{\"{u}}nnewig and
                  Niels Rump},
  title        = {Digital Rights Management - Technological, Economic, Legal and Political
                  Aspects},
  series       = {Lecture Notes in Computer Science},
  volume       = {2770},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/b12637},
  doi          = {10.1007/B12637},
  isbn         = {3-540-40465-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/2003.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/drm/2003w,
  editor       = {Moti Yung},
  title        = {Proceedings of the 2003 {ACM} workshop on Digital rights management
                  2003, Washington, DC, USA, October 27, 2003},
  publisher    = {{ACM}},
  year         = {2003},
  isbn         = {1-58113-786-9},
  timestamp    = {Thu, 23 Jun 2016 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/2003w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BiddleEPW02,
  author       = {Peter Biddle and
                  Paul England and
                  Marcus Peinado and
                  Bryan Willman},
  editor       = {Joan Feigenbaum},
  title        = {The Darknet and the Future of Content Protection},
  booktitle    = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop,
                  {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2696},
  pages        = {155--176},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-44993-5\_10},
  doi          = {10.1007/978-3-540-44993-5\_10},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BiddleEPW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BoldyrevaJ02,
  author       = {Alexandra Boldyreva and
                  Markus Jakobsson},
  editor       = {Joan Feigenbaum},
  title        = {Theft-Protected Proprietary Certificates},
  booktitle    = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop,
                  {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2696},
  pages        = {208--220},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-44993-5\_13},
  doi          = {10.1007/978-3-540-44993-5\_13},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BoldyrevaJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChowEJO02,
  author       = {Stanley Chow and
                  Philip A. Eisen and
                  Harold Johnson and
                  Paul C. van Oorschot},
  editor       = {Joan Feigenbaum},
  title        = {A White-Box {DES} Implementation for {DRM} Applications},
  booktitle    = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop,
                  {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2696},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-44993-5\_1},
  doi          = {10.1007/978-3-540-44993-5\_1},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ChowEJO02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DodisF02,
  author       = {Yevgeniy Dodis and
                  Nelly Fazio},
  editor       = {Joan Feigenbaum},
  title        = {Public Key Broadcast Encryption for Stateless Receivers},
  booktitle    = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop,
                  {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2696},
  pages        = {61--80},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-44993-5\_5},
  doi          = {10.1007/978-3-540-44993-5\_5},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/DodisF02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Halderman02,
  author       = {John A. Halderman},
  editor       = {Joan Feigenbaum},
  title        = {Evaluating New Copy-Prevention Techniques for Audio CDs},
  booktitle    = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop,
                  {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2696},
  pages        = {101--117},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-44993-5\_7},
  doi          = {10.1007/978-3-540-44993-5\_7},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Halderman02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JacobBF02,
  author       = {Matthias Jacob and
                  Dan Boneh and
                  Edward W. Felten},
  editor       = {Joan Feigenbaum},
  title        = {Attacking an Obfuscated Cipher by Injecting Faults},
  booktitle    = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop,
                  {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2696},
  pages        = {16--31},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-44993-5\_2},
  doi          = {10.1007/978-3-540-44993-5\_2},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/JacobBF02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JohnsonS02,
  author       = {Robert Johnson and
                  Jessica Staddon},
  editor       = {Joan Feigenbaum},
  title        = {{FAIR:} Fair Audience InfeRence},
  booktitle    = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop,
                  {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2696},
  pages        = {190--207},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-44993-5\_12},
  doi          = {10.1007/978-3-540-44993-5\_12},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/JohnsonS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KiayiasY02,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  editor       = {Joan Feigenbaum},
  title        = {Breaking and Repairing Asymmetric Public-Key Traitor Tracing},
  booktitle    = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop,
                  {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2696},
  pages        = {32--50},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-44993-5\_3},
  doi          = {10.1007/978-3-540-44993-5\_3},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/KiayiasY02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KirovskiP02,
  author       = {Darko Kirovski and
                  Fabien A. P. Petitcolas},
  editor       = {Joan Feigenbaum},
  title        = {Replacement Attack on Arbitrary Watermarking Systems},
  booktitle    = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop,
                  {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2696},
  pages        = {177--189},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-44993-5\_11},
  doi          = {10.1007/978-3-540-44993-5\_11},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/KirovskiP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KorbaK02,
  author       = {Larry Korba and
                  Steve Kenny},
  editor       = {Joan Feigenbaum},
  title        = {Towards Meeting the Privacy Challenge: Adapting {DRM}},
  booktitle    = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop,
                  {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2696},
  pages        = {118--136},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-44993-5\_8},
  doi          = {10.1007/978-3-540-44993-5\_8},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/KorbaK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LaMacchia02,
  author       = {Brian A. LaMacchia},
  editor       = {Joan Feigenbaum},
  title        = {Key Challenges in {DRM:} An Industry Perspective},
  booktitle    = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop,
                  {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2696},
  pages        = {51--60},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-44993-5\_4},
  doi          = {10.1007/978-3-540-44993-5\_4},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/LaMacchia02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MulliganB02,
  author       = {Deirdre K. Mulligan and
                  Aaron J. Burstein},
  editor       = {Joan Feigenbaum},
  title        = {Implementing Copyright Limitations in Rights Expression Languages},
  booktitle    = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop,
                  {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2696},
  pages        = {137--154},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-44993-5\_9},
  doi          = {10.1007/978-3-540-44993-5\_9},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/MulliganB02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Safavi-NainiW02,
  author       = {Reihaneh Safavi{-}Naini and
                  Yejing Wang},
  editor       = {Joan Feigenbaum},
  title        = {Traitor Tracing for Shortened and Corrupted Fingerprints},
  booktitle    = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop,
                  {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2696},
  pages        = {81--100},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-44993-5\_6},
  doi          = {10.1007/978-3-540-44993-5\_6},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Safavi-NainiW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2001drm,
  editor       = {Tomas Sander},
  title        = {Security and Privacy in Digital Rights Management, {ACM} {CCS-8} Workshop
                  {DRM} 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2320},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-47870-1},
  doi          = {10.1007/3-540-47870-1},
  isbn         = {3-540-43677-4},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2001drm.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Bechtold01,
  author       = {Stefan Bechtold},
  editor       = {Tomas Sander},
  title        = {From Copyright to Information Law - Implications of Digital Rights
                  Management},
  booktitle    = {Security and Privacy in Digital Rights Management, {ACM} {CCS-8} Workshop
                  {DRM} 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2320},
  pages        = {213--232},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47870-1\_14},
  doi          = {10.1007/3-540-47870-1\_14},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Bechtold01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Buhse01,
  author       = {Willms Buhse},
  editor       = {Tomas Sander},
  title        = {Implications of Digital Rights Management for Online Music - {A} Business
                  Perspective},
  booktitle    = {Security and Privacy in Digital Rights Management, {ACM} {CCS-8} Workshop
                  {DRM} 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2320},
  pages        = {201--212},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47870-1\_13},
  doi          = {10.1007/3-540-47870-1\_13},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Buhse01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChangA01,
  author       = {Hoi Chang and
                  Mikhail J. Atallah},
  editor       = {Tomas Sander},
  title        = {Protecting Software Code by Guards},
  booktitle    = {Security and Privacy in Digital Rights Management, {ACM} {CCS-8} Workshop
                  {DRM} 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2320},
  pages        = {160--175},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47870-1\_10},
  doi          = {10.1007/3-540-47870-1\_10},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ChangA01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CrosbyGJSW01,
  author       = {Scott A. Crosby and
                  Ian Goldberg and
                  Robert Johnson and
                  Dawn Xiaodong Song and
                  David A. Wagner},
  editor       = {Tomas Sander},
  title        = {A Cryptanalysis of the High-Bandwidth Digital Content Protection System},
  booktitle    = {Security and Privacy in Digital Rights Management, {ACM} {CCS-8} Workshop
                  {DRM} 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2320},
  pages        = {192--200},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47870-1\_12},
  doi          = {10.1007/3-540-47870-1\_12},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/CrosbyGJSW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FeigenbaumFSS01,
  author       = {Joan Feigenbaum and
                  Michael J. Freedman and
                  Tomas Sander and
                  Adam Shostack},
  editor       = {Tomas Sander},
  title        = {Privacy Engineering for Digital Rights Management Systems},
  booktitle    = {Security and Privacy in Digital Rights Management, {ACM} {CCS-8} Workshop
                  {DRM} 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2320},
  pages        = {76--105},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47870-1\_6},
  doi          = {10.1007/3-540-47870-1\_6},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/FeigenbaumFSS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HorneMST01,
  author       = {Bill G. Horne and
                  Lesley R. Matheson and
                  Casey Sheehan and
                  Robert Endre Tarjan},
  editor       = {Tomas Sander},
  title        = {Dynamic Self-Checking Techniques for Improved Tamper Resistance},
  booktitle    = {Security and Privacy in Digital Rights Management, {ACM} {CCS-8} Workshop
                  {DRM} 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2320},
  pages        = {141--159},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47870-1\_9},
  doi          = {10.1007/3-540-47870-1\_9},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/HorneMST01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JakobssonR01,
  author       = {Markus Jakobsson and
                  Michael K. Reiter},
  editor       = {Tomas Sander},
  title        = {Discouraging Software Piracy Using Software Aging},
  booktitle    = {Security and Privacy in Digital Rights Management, {ACM} {CCS-8} Workshop
                  {DRM} 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2320},
  pages        = {1--12},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47870-1\_1},
  doi          = {10.1007/3-540-47870-1\_1},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/JakobssonR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KiayiasY01,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  editor       = {Tomas Sander},
  title        = {On Crafty Pirates and Foxy Tracers},
  booktitle    = {Security and Privacy in Digital Rights Management, {ACM} {CCS-8} Workshop
                  {DRM} 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2320},
  pages        = {22--39},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47870-1\_3},
  doi          = {10.1007/3-540-47870-1\_3},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/KiayiasY01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KingK01,
  author       = {James King and
                  Panos Kudumakis},
  editor       = {Tomas Sander},
  title        = {{MPEG-4} {IPMP} Extensions},
  booktitle    = {Security and Privacy in Digital Rights Management, {ACM} {CCS-8} Workshop
                  {DRM} 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2320},
  pages        = {126--140},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47870-1\_8},
  doi          = {10.1007/3-540-47870-1\_8},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/KingK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KravitzYS01,
  author       = {David W. Kravitz and
                  Kim{-}Ee Yeoh and
                  Nicol So},
  editor       = {Tomas Sander},
  title        = {Secure Open Systems for Protecting Privacy and Digital Services},
  booktitle    = {Security and Privacy in Digital Rights Management, {ACM} {CCS-8} Workshop
                  {DRM} 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2320},
  pages        = {106--125},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47870-1\_7},
  doi          = {10.1007/3-540-47870-1\_7},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/KravitzYS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MihcakV01,
  author       = {Mehmet Kivan{\c{c}} Mih{\c{c}}ak and
                  Ramarathnam Venkatesan},
  editor       = {Tomas Sander},
  title        = {New Iterative Geometric Methods for Robust Perceptual Image Hashing},
  booktitle    = {Security and Privacy in Digital Rights Management, {ACM} {CCS-8} Workshop
                  {DRM} 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2320},
  pages        = {13--21},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47870-1\_2},
  doi          = {10.1007/3-540-47870-1\_2},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/MihcakV01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MillerF01,
  author       = {Ernest Miller and
                  Joan Feigenbaum},
  editor       = {Tomas Sander},
  title        = {Taking the Copy Out of Copyright},
  booktitle    = {Security and Privacy in Digital Rights Management, {ACM} {CCS-8} Workshop
                  {DRM} 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2320},
  pages        = {233--244},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47870-1\_15},
  doi          = {10.1007/3-540-47870-1\_15},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/MillerF01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Pinkas01,
  author       = {Benny Pinkas},
  editor       = {Tomas Sander},
  title        = {Efficient State Updates for Key Management},
  booktitle    = {Security and Privacy in Digital Rights Management, {ACM} {CCS-8} Workshop
                  {DRM} 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2320},
  pages        = {40--56},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47870-1\_4},
  doi          = {10.1007/3-540-47870-1\_4},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Pinkas01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Safavi-NainiW01,
  author       = {Reihaneh Safavi{-}Naini and
                  Yejing Wang},
  editor       = {Tomas Sander},
  title        = {Collusion Secure q-ary Fingerprinting for Perceptual Content},
  booktitle    = {Security and Privacy in Digital Rights Management, {ACM} {CCS-8} Workshop
                  {DRM} 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2320},
  pages        = {57--75},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47870-1\_5},
  doi          = {10.1007/3-540-47870-1\_5},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Safavi-NainiW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ShapiroV01,
  author       = {William Shapiro and
                  Radek Vingralek},
  editor       = {Tomas Sander},
  title        = {How to Manage Persistent State in {DRM} Systems},
  booktitle    = {Security and Privacy in Digital Rights Management, {ACM} {CCS-8} Workshop
                  {DRM} 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2320},
  pages        = {176--191},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47870-1\_11},
  doi          = {10.1007/3-540-47870-1\_11},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ShapiroV01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics