Security and Privacy in Digital Rights Management: Acm Ccs-8 Workshop Drm 2001, Philadelphia, Pa, Usa, November 5, 2001 : Revised Papers

by ; ;
Format: Paperback
Pub. Date: 2002-05-01
Publisher(s): Springer Verlag
List Price: $117.77

Rent Textbook

Select for Price
There was a problem. Please try again later.

Rent Digital

Rent Digital Options
Online:30 Days access
Downloadable:30 Days
$19.80
Online:60 Days access
Downloadable:60 Days
$26.40
Online:90 Days access
Downloadable:90 Days
$33.00
Online:120 Days access
Downloadable:120 Days
$39.60
Online:180 Days access
Downloadable:180 Days
$42.90
Online:1825 Days access
Downloadable:Lifetime Access
$65.99
*To support the delivery of the digital material to you, a non-refundable digital delivery fee of $3.99 will be charged on each digital item.
$42.90*

New Textbook

We're Sorry
Sold Out

Used Textbook

We're Sorry
Sold Out

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

This book constitutes the thoroughly refereed post-proceedings of the International Workshop on Security and Privacy in Digital Rights Management, DRM 2001, held during the ACM CCS-8 Conference in Philadelphia, PA, USA, in November 2001. The 14 revised full papers presented were carefully reviewed and selected from 50 submissions. The papers are organized in topical sections on renewability, fuzzy hashing, cryptographic techniques and fingerprinting, privacy and architectures, software tamper resistance, cryptanalysis, and economic and legal aspects.

Table of Contents

Renewability
Discouraging Software Piracy Using Software Agingp. 1
Fuzzy Hashing
New Iterative Geometric Methods for Robust Perceptual Image Hashingp. 13
Cryptographic Techniques, Fingerprinting
On Crafty Pirates and Foxy Tracersp. 22
Efficient State Updates for Key Managementp. 40
Collusion Secure q-ary Fingerprinting for Perceptual Contentp. 57
Privacy, Architectures
Privacy Engineering for Digital Rights Management Systemsp. 76
Secure Open Systems for Protecting Privacy and Digital Servicesp. 106
MPEG-4 IPMP Extensionsp. 126
Software Tamper Resistance
Dynamic Self-Checking Techniques for Improved Tamper Resistancep. 141
Protecting Software Code by Guardsp. 160
How to Manage Persistent State in DRM Systemsp. 176
Cryptanalysis
A Cryptanalysis of the High-Bandwidth Digital Content Protection Systemp. 192
Economics, Legal Aspects
Implications of Digital Rights Management for Online Music - A Business Perspectivep. 201
From Copyright to Information Law - Implications of Digital Rights Managementp. 213
Taking the Copy Out of Copyrightp. 233
Author Indexp. 245
Table of Contents provided by Publisher. All Rights Reserved.

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.