Author of the publication

Traitor tracing for prerecorded and recordable media.

, , and . Digital Rights Management Workshop, page 83-90. ACM, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Building Communities with People-Tags., , and . INTERACT (2), volume 4663 of Lecture Notes in Computer Science, page 357-360. Springer, (2007)Broadcast Encryption's Bright Future., , and . Computer, 35 (8): 57-63 (2002)Sicherheitskonzepte im WWW.. Springer, (1998)Tag-it, snag-it, or bag-it: combining tags, threads, and folders in e-mail., , , , , and . CHI Extended Abstracts, page 2179-2194. ACM, (2008)Enabling secure distribution of digital media to SD-cards., , , , and . ACM Multimedia, page 495-496. ACM, (2006)Traitor tracing for prerecorded and recordable media., , and . Digital Rights Management Workshop, page 83-90. ACM, (2004)Enabling efficient orienteering behavior in webmail clients., , , , , and . UIST, page 139-148. ACM, (2007)Developing structured WWW-sites with W3DT., and . WebNet, AACE, (1996)xCP: peer-to-peer content protection., , and . IEEE Signal Process. Mag., 21 (2): 71-81 (2004)Modular design of complex Web-applications with W3DT., and . WETICE, page 328-333. IEEE Computer Society, (1996)