From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Modeling and implementation of digital rights., , , и . J. Syst. Softw., 73 (3): 533-549 (2004)A trustworthy end-to-end key management scheme for digital rights management., , , и . ACM Multimedia, стр. 635-638. ACM, (2006)End-to-End Digital Rights Management on the Overall Value-Chains of Content Distribution., , , , и . IMSA, стр. 294-297. IASTED/ACTA Press, (2005)Prototype Development of Directory Interface on Web Browser., , , и . Applied Informatics, стр. 90-92. IASTED/ACTA Press, (1999)Protecting ASF Movie on VOD., , и . TrustBus, том 3184 из Lecture Notes in Computer Science, стр. 242-250. Springer, (2004)A Design of the Hybrid Messaging System (HMS) Based on PKI., , , , , и . PDPTA, CSREA Press, (2000)Privacy Protection in Ubiquitous Computing Based on Privacy Label and Information Flow., и . ICCSA (2), том 3044 из Lecture Notes in Computer Science, стр. 46-54. Springer, (2004)An Algorithm to enerate Sets of Node-Disjoint Paths in N-Dimensional Hypercube Network.. PDPTA, стр. 136-139. CSREA Press, (1996)Protection scheme for secure MPEG-2 streaming., , и . ICME, стр. 927-930. IEEE Computer Society, (2004)MPEG-2 Streaming Protection Scheme for Digital Rights Management., , и . IEICE Trans. Inf. Syst., 87-D (12): 2594-2601 (2004)