نتایج جستجو برای: copy protection
تعداد نتایج: 227907 فیلتر نتایج به سال:
THIS PAPER REVIEWS BASIC PRINCIPLES OF COPY PROTECTION FOR DIGITAL VIDEO. WE DISTINGUISH BETWEEN THE ROLE OF CRYPTOGRAPHY AND EMBEDDED SIGNALING, AS SEEN BY STANDARDIZATION BODIES SUCH AS THE DVD COPY PROTECTION TECHNICAL WORKING GROUP (CPTWG). WE IDENTIFY SEVERAL ISSUES THAT ARE UNRESOLVED AND/OR CURRENTLY UNDER DISCUSSION. IN PARTICULAR, WE ELABORATE ON PLAY CONTROL, COPY GENERATION CONTROL, ...
. clicking here colleagues, clients, or customers by , you can order high-quality copies for your If you wish to distribute this article to others . here following the guidelines can be obtained by Permission to republish or repurpose articles or portions of articles (this information is current as of February 28, 2010 ): The following resources related to this article are available online at w...
The smart devices and cloud computing technology have been introduced into a new content service such as N-Screen service. The DRM(digital rights management) techniques have been rapidly developed in accordance with the new service environment after the awareness on the importance of DRM technology. In spite of the technical advancement of DRM, it is being taken as an unwelcome thing by the con...
One leading edge of intellectual exploration that Tom Bouchard significantly contributed to lies at the interface of behavior genetics and evolutionary biology. Behavior geneticists have amply demonstrated that most important psychological individual differences owe part of their variance to genetic variants. An interesting issue from an evolutionary perspective concerns why meaningful genetic ...
This paper proposes FlexToken, a new copy prevention scheme for digital rights such as tickets or coupons, which are circulated as pieces of paper in the real world. The important feature of this scheme is that digital rights are represented using two separate types of information: the contents and the token of the rights. The token represents the \genuineness" of the contents and distinguishes...
Respondents from eight Korean and U.S. higher education institutions were surveyed as to their knowledge and experience with various forms of computer malware. The surveys provide insight into knowledge of rootkits that have become coffee lounge discussion following the once secretive Sony rootkit news break in late 2005 and then the rash of accusations and acknowledgements of other rootkits th...
This article considers how consumer protection law and policy should address the interests of particularly vulnerable financial consumers. Specifically, the article proposes a taxonomy of vulnerability which helps to identify (a) what makes consumers particularly vulnerable, and (b) how consumer protection law and policy can respond to these causes in a way that provides such consumers with app...
This paper describes an innovative approach to solve some of the problems that arise when integrating virtual reality capabilities into e-learning environments. The VRML representation of a scene includes, along with its geometric description, a full specification of the student-scene interaction logic. This representation is rendered by a browser, which also orchestrates the interaction accord...
A substantial quantity of research has previously been conducted into the identification and application of measures related to the detection and prevention of identity theft and identity fraud. In the current security conscious environment, the concept of creating an artificial identity is generally met with both caution and suspicion. Much of the attention placed on the concept of identity fa...
The Chinese book project Siku Quanshu (The Complete Library of Four Treasures) was conducted at the Emperor Qianlong’s command starting in 1772. Thirteen thousand two hundred fifty-four books were collected nationwide and thousands of scholars were involved; 3,462 books were selected to make up the Siku Quanshu proper. Over 4 million pages were transcribed by thousands of copyists. Out of the s...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید