نتایج جستجو برای: copy protection

تعداد نتایج: 227907  

2000
Jean-Paul M. G. Linnartz Joop Talstra Ton Kalker Maurice Maes

THIS PAPER REVIEWS BASIC PRINCIPLES OF COPY PROTECTION FOR DIGITAL VIDEO. WE DISTINGUISH BETWEEN THE ROLE OF CRYPTOGRAPHY AND EMBEDDED SIGNALING, AS SEEN BY STANDARDIZATION BODIES SUCH AS THE DVD COPY PROTECTION TECHNICAL WORKING GROUP (CPTWG). WE IDENTIFY SEVERAL ISSUES THAT ARE UNRESOLVED AND/OR CURRENTLY UNDER DISCUSSION. IN PARTICULAR, WE ELABORATE ON PLAY CONTROL, COPY GENERATION CONTROL, ...

2010
Jonathan Sebat J. D. Sullivan

. clicking here colleagues, clients, or customers by , you can order high-quality copies for your If you wish to distribute this article to others . here following the guidelines can be obtained by Permission to republish or repurpose articles or portions of articles (this information is current as of February 28, 2010 ): The following resources related to this article are available online at w...

Journal: :J. Internet Serv. Inf. Secur. 2013
Hyejoo Lee Changho Seo Sang-Uk Shin

The smart devices and cloud computing technology have been introduced into a new content service such as N-Screen service. The DRM(digital rights management) techniques have been rapidly developed in accordance with the new service environment after the awareness on the importance of DRM technology. In spite of the technical advancement of DRM, it is being taken as an unwelcome thing by the con...

2010
Steven W. Gangestad

One leading edge of intellectual exploration that Tom Bouchard significantly contributed to lies at the interface of behavior genetics and evolutionary biology. Behavior geneticists have amply demonstrated that most important psychological individual differences owe part of their variance to genetic variants. An interesting issue from an evolutionary perspective concerns why meaningful genetic ...

2000
Masayuki Terada Hiroshi Kuno Masayuki Hanadate

This paper proposes FlexToken, a new copy prevention scheme for digital rights such as tickets or coupons, which are circulated as pieces of paper in the real world. The important feature of this scheme is that digital rights are represented using two separate types of information: the contents and the token of the rights. The token represents the \genuineness" of the contents and distinguishes...

Journal: :IJISP 2007
Kirk P. Arnett Mark B. Schmidt Allen C. Johnston Jongki Kim Hajin Hwang

Respondents from eight Korean and U.S. higher education institutions were surveyed as to their knowledge and experience with various forms of computer malware. The surveys provide insight into knowledge of rootkits that have become coffee lounge discussion following the once secretive Sony rootkit news break in late 2005 and then the rash of accusations and acknowledgements of other rootkits th...

2016
PETER CARTWRIGHT

This article considers how consumer protection law and policy should address the interests of particularly vulnerable financial consumers. Specifically, the article proposes a taxonomy of vulnerability which helps to identify (a) what makes consumers particularly vulnerable, and (b) how consumer protection law and policy can respond to these causes in a way that provides such consumers with app...

2004
José M. Cubero Luis Salgado Julián Cabrera

This paper describes an innovative approach to solve some of the problems that arise when integrating virtual reality capabilities into e-learning environments. The VRML representation of a scene includes, along with its geometric description, a full specification of the student-scene interaction logic. This representation is rendered by a browser, which also orchestrates the interaction accord...

2005
Lennon Hopkins

A substantial quantity of research has previously been conducted into the identification and application of measures related to the detection and prevention of identity theft and identity fraud. In the current security conscious environment, the concept of creating an artificial identity is generally met with both caution and suspicion. Much of the attention placed on the concept of identity fa...

Journal: :Library Trends 2007
Chengzhi Wang

The Chinese book project Siku Quanshu (The Complete Library of Four Treasures) was conducted at the Emperor Qianlong’s command starting in 1772. Thirteen thousand two hundred fifty-four books were collected nationwide and thousands of scholars were involved; 3,462 books were selected to make up the Siku Quanshu proper. Over 4 million pages were transcribed by thousands of copyists. Out of the s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید