Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Digital Rights Management: ACM CCS-9 Workshop, DRM 2002, Washington, DC, USA, November 18, 2002, Revised Papers

Buy
This book constitutes the thoroughly refereed post-proceedings of the Second International Workshop on Digital Rights Management, DRM 2002, held in Washington, DC, USA, in November 2002, in conjunction with ACM CCS-9.

The 13 revised full papers presented were carefully reviewed and selected for inclusion in the book. Among the topics addressed are DES implementation for DRM applications, cryptographic attacks, industrial challenges, public key broadcast encryption, fingerprinting, copy-prevention techniques, copyright limitations, content protection, watermarking systems, and theft-protected proprietary certificates.

Increasingly, the Internet is used for the distribution of digital goods, including digital versions of books, articles, music, and images. This new distribution channel is a potential boon to both producers and consumers of digital goods, because vast amounts of material can be made available conveniently and inexpensively. However, the ease with which digital goods can be copied and redistributed makes the Internet well suited for unauthorized copying, modification, and redistribution. Adoption of new technologies such as high-bandwidth connections and peer-to-peer networks is currently accelerating both authorized and unauthorized distribution of digital works.

In 2001, the ACM initiated an annual series of workshops to address technical, legal, and economic problems posed by the digital distribution of creative works. The 2002 ACM Workshop on Digital Rights Management (DRM 2002), held in Washington, DC on November 18, 2002, was the second in this annual series. This volume contains the papers presented at that very well attended and stimulating workshop.

The success of DRM 2002 was the result of excellent work by many people, to whom I am extremely grateful. They include Sushil Jajodia, Charles Youman, and Mary Jo Olsavsky at George Mason University, the members of the Program Committee, my assistant, Judi Paige, and my student Vijay Ramachandran.

(HTML tags aren't allowed.)

Securing & Optimizing Linux: A Hands on Guide for Linux Professionals
Securing & Optimizing Linux: A Hands on Guide for Linux Professionals
This book is intended for a technical audience and system administrators who manage Linux servers, but it also includes material for home users and others. It discusses how to install and setup a Red Hat Linux Server with all the necessary security and optimization for a high performance Linux specific machine. Since we speak of optimization and...
Environmental Management of Energy from Biofuels and Biofeedstocks
Environmental Management of Energy from Biofuels and Biofeedstocks

Biomass is a renewable resource, whose utilization has received great attention due to environmental considerations and the increasing demands of energy worldwide. Since the energy crises of the 1970s, many countries have become interested in biomass as a fuel source to expand the development of domestic and renewable energy sources, reduce...

Ruby on Rails Tutorial: Learn Web Development with Rails (2nd Edition)
Ruby on Rails Tutorial: Learn Web Development with Rails (2nd Edition)

Ruby on Rails™ Tutorial by Michael Hartl has become a must-read for developers learning how to build Rails apps.”

Peter Cooper, Editor of Ruby Inside

 

Using Rails, developers can build...


Data Mining: Foundations and Practice (Studies in Computational Intelligence)
Data Mining: Foundations and Practice (Studies in Computational Intelligence)
The IEEE ICDM 2004 workshop on the Foundation of Data Mining and the IEEE ICDM 2005 workshop on the Foundation of Semantic Oriented Data and Web Mining focused on topics ranging from the foundations of data mining to new data mining paradigms. The workshops brought together both data mining researchers and practitioners to discuss these two...
Business Data Communications and Networking
Business Data Communications and Networking
Over the past few years, many fundamental changes have occurred in data communications and networking that will shape the future for decades to come. Networking applications such as the Internet and World Wide Web have exploded into the business world. High-speed modems providing megabit data rates (millions of bits per second)...
Gauge Field Theories: An Introduction with Applications
Gauge Field Theories: An Introduction with Applications
Over the last two decades a revolution has taken place concerning the way physicists view the fundamental processes taking place in our universe. This revolution has its basis in the belief that all fundamental interactions are associated with a particularly beautiful and powerful kind of quantum field theory-a theory of local gauge fields. This...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy