From post

Privacy Engineering for Digital Rights Management Systems.

, , , и . Digital Rights Management Workshop, том 2320 из Lecture Notes in Computer Science, стр. 76-105. Springer, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

UX Aspects of Threat Information Sharing Platforms: An Examination & Lessons Learned Using Personas., и . WISCS@CCS, стр. 51-59. ACM, (2015)Scalable, accountable privacy management for large organizations., , , , , , , и . EDOCW, стр. 168-175. IEEE Computer Society, (2009)If Piracy Is the Problem, Is DRM the Answer?, , , , и . Digital Rights Management, том 2770 из Lecture Notes in Computer Science, Springer, (2003)Protecting Mobile Agents Against Malicious Hosts., и . Mobile Agents and Security, том 1419 из Lecture Notes in Computer Science, стр. 44-60. Springer, (1998)Efficient Accumulators without Trapdoor Extended Abstracts.. ICICS, том 1726 из Lecture Notes in Computer Science, стр. 252-262. Springer, (1999)Auditable, Anonymous Electronic Cash Extended Abstract., и . CRYPTO, том 1666 из Lecture Notes in Computer Science, стр. 555-572. Springer, (1999)Flow Control: A New Approach for Anonymity Control in Electronic Cash Systems., и . Financial Cryptography, том 1648 из Lecture Notes in Computer Science, стр. 46-61. Springer, (1999)Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases., , , , и . Privacy Enhancing Technologies, том 5672 из Lecture Notes in Computer Science, стр. 185-201. Springer, (2009)Deniable payments and electronic campaign finance., и . CFP, стр. 67-68. ACM, (2000)Escrow services and incentives in peer-to-peer networks., , и . EC, стр. 85-94. ACM, (2001)