Skip to main content
  • Conference proceedings
  • © 2003

Digital Rights Management

ACM CCS-9 Workshop, DRM 2002, Washington, DC, USA, November 18, 2002, Revised Papers

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 2696)

Conference series link(s): DRM: ACM Workshop on Digital Rights Management

Conference proceedings info: DRM 2002.

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

This is a preview of subscription content, access via your institution.

Table of contents (13 papers)

  1. Front Matter

  2. ACM DRM 2002

    1. A White-Box DES Implementation for DRM Applications

      • Stanley Chow, Phil Eisen, Harold Johnson, Paul C. van Oorschot
      Pages 1-15
    2. Attacking an Obfuscated Cipher by Injecting Faults

      • Matthias Jacob, Dan Boneh, Edward Felten
      Pages 16-31
    3. Breaking and Repairing Asymmetric Public-Key Traitor Tracing

      • Aggelos Kiayias, Moti Yung
      Pages 32-50
    4. Key Challenges in DRM: An Industry Perspective

      • Brian A. LaMacchia
      Pages 51-60
    5. Public Key Broadcast Encryption for Stateless Receivers

      • Yevgeniy Dodis, Nelly Fazio
      Pages 61-80
    6. Traitor Tracing for Shortened and Corrupted Fingerprints

      • Reihaneh Safavi-Naini, Yejing Wang
      Pages 81-100
    7. Towards Meeting the Privacy Challenge: Adapting DRM

      • Larry Korba, Steve Kenny
      Pages 118-136
    8. Implementing Copyright Limitations in Rights Expression Languages

      • Deirdre Mulligan, Aaron Burstein
      Pages 137-154
    9. The Darknet and the Future of Content Protection

      • Peter Biddle, Paul England, Marcus Peinado, Bryan Willman
      Pages 155-176
    10. Replacement Attack on Arbitrary Watermarking Systems

      • Darko Kirovski, Fabien A. P. Petitcolas
      Pages 177-189
    11. FAIR: Fair Audience InfeRence

      • Rob Johnson, Jessica Staddon
      Pages 190-207
    12. Theft-Protected Proprietary Certificates

      • Alexandra Boldyreva, Markus Jakobsson
      Pages 208-220
  3. Back Matter

Other Volumes

  1. Digital Rights Management

About this book

 

This book constitutes the thoroughly refereed post-proceedings of the Second International Workshop on Digital Rights Management, DRM 2002, held in Washington, DC, USA, in November 2002, in conjunction with ACM CCS-9.

The 13 revised full papers presented were carefully reviewed and selected for inclusion in the book. Among the topics addressed are DES implementation for DRM applications, cryptographic attacks, industrial challenges, public key broadcast encryption, fingerprinting, copy-prevention techniques, copyright limitations, content protection, watermarking systems, and theft-protected proprietary certificates.

Keywords

  • anonymity
  • content protection
  • copyright protection
  • cryptographic attacks
  • data security
  • digital
  • digital rights management
  • fingerprinting
  • intellectual property protection
  • peer-to-peer networks
  • privacy
  • steganography
  • watermarking

Editors and Affiliations

  • Yale University,  

    Joan Feigenbaum

Bibliographic Information

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions