Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Defending against the Pirate Evolution Attack., and . ISPEC, volume 5451 of Lecture Notes in Computer Science, page 147-158. Springer, (2009)xCP: peer-to-peer content protection., , and . IEEE Signal Process. Mag., 21 (2): 71-81 (2004)Broadcast encryption versus public key cryptography in content protection systems.. Digital Rights Management Workshop, page 39-46. ACM, (2009)The Almaden Distributed Digital Library System., , , , , , , , , and 5 other author(s). ADL, volume 1082 of Lecture Notes in Computer Science, page 203-220. Springer, (1995)A Digital Library System for Periodicals Distribution., , , , , , , , , and 4 other author(s). ADL, page 95-103. IEEE Computer Society, (1996)Digital Signets: Self-Enforcing Protection of Digital Information (Preliminary Version)., , and . STOC, page 489-498. ACM, (1996)On Finding Non-Intersecting Straightline Connections of Grid Points to the Boundary., and . J. Algorithms, 13 (4): 636-656 (1992)A Fast Algorithm for Connecting Grid Points to the Boundary with Nonintersecting Straight Lines., and . SODA, page 465-474. ACM/SIAM, (1991)Piracy Protection for Streaming Content in Home Networks., and . SEC, volume 354 of IFIP Advances in Information and Communication Technology, page 128-141. Springer, (2011)Efficient traitor tracing for clone attack in content protection., and . SAC, page 1544-1549. ACM, (2011)