Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptographic Containers and the Digital Library., , and . Verläßliche IT-Systeme, Vieweg+Teubner Verlag, (1997)Defending against the Pirate Evolution Attack., and . ISPEC, volume 5451 of Lecture Notes in Computer Science, page 147-158. Springer, (2009)xCP: peer-to-peer content protection., , and . IEEE Signal Process. Mag., 21 (2): 71-81 (2004)The Almaden Distributed Digital Library System., , , , , , , , , and 5 other author(s). ADL, volume 1082 of Lecture Notes in Computer Science, page 203-220. Springer, (1995)Broadcast encryption versus public key cryptography in content protection systems.. Digital Rights Management Workshop, page 39-46. ACM, (2009)A Digital Library System for Periodicals Distribution., , , , , , , , , and 4 other author(s). ADL, page 95-103. IEEE Computer Society, (1996)Safeguarding Digital Library Contents and Users: Storing, Sending, Showing, and Honoring Usage Terms and Conditions., and . D Lib Mag., (1998)On Finding Non-Intersecting Straightline Connections of Grid Points to the Boundary., and . J. Algorithms, 13 (4): 636-656 (1992)A Fast Algorithm for Connecting Grid Points to the Boundary with Nonintersecting Straight Lines., and . SODA, page 465-474. ACM/SIAM, (1991)Digital Signets: Self-Enforcing Protection of Digital Information (Preliminary Version)., , and . STOC, page 489-498. ACM, (1996)