نتایج جستجو برای: copy protection

تعداد نتایج: 227907  

1996
G. C. Langelaar J.C.A. van der Lubbe J. Biemond

Service providers are reluctant to distribute their multimedia data in digital form because of their fears for unrestricted duplication and dissemination. Therefore robust methods must be developed to protect the proprietary rights of the multimedia data owners and to realize a copy protection

2006
J. Alex Halderman Edward W. Felten

In the fall of 2005, problems discovered in two SonyBMG compact disc copy protection systems, XCP and MediaMax, triggered a public uproar that ultimately led to class-action litigation and the recall of millions of discs. We present an in-depth analysis of these technologies, including their design, implementation, and deployment. The systems are surprisingly complex and suffer from a diverse a...

2010
Ramya Dharam Sankardas Roy Sajjan G. Shiva

Software protection has recently attracted interest from developers. Self-checking software is one of the approaches for software protection. This paper surveys the existing techniques for building self-checking software and presents a taxonomy of the current endeavors. This taxonomy should help the reader to get the global view of the current solution space of self-checking software techniques...

2011
Nikolaos Triantafyllou Katerina Ksystra Petros S. Stefaneas Panagiotis Frangos

Digital Right Management (DRM) Systems have been created to meet the need for digital content protection and distribution. In this paper we present some of the directions of our ongoing research to apply algebraic specification techniques on mobile DRM systems.

2005
Yury Lifshits

The goal of the paper is to construct mathematical abstractions of different aspects of real life software protection. We introduce three following notions: program slowdown, generalized encryption scheme and function sharing. These schemes allowed to discover new applications of such known ideas as trap-door functions and self-correcting programs.

1999
Thomas J. Prusa

This paper documents two key costs of AD protection. First, once AD has been adopted countries often have a difficult time restraining its use. In recent years “new” users have accounted for half of the overall world total. Many of the heaviest AD users are countries who did not even have an AD statute a decade ago. Second, I will show that that on average AD duties cause the value of imports t...

Journal: :IEICE Transactions 2008
Hyun-il Lim Heewan Park Seokwoo Choi Taisook Han

A software birthmark means the inherent characteristics of a program that can be used to identify the program. A comparison of such birthmarks facilitates the detection of software theft. In this paper, we propose a static Java birthmark based on a set of stack patterns, which reflect the characteristic of Java applications. A stack pattern denotes a sequence of bytecodes that share their opera...

2013
Ronald Toegl Johannes Winter Martin Pirker

Mobile devices have become powerful and user-friendly. At the same time they have become a hosting platform for a wide variety of services. Naturally, the interests of the various stakeholders on a mobile platform are not the same. Thus, there is demand for a strict separation model of services on mobile devices. In this paper, we outline a possible approach to enable a Secure Media Path on mob...

2013
Alexander Rasch Tobias Wenzel

This paper studies the impact of software piracy in a two-sidedmarket setting. Software platforms attract developers and users to maximize their profits. The equilibrium price structure is affected by piracy: license fees to developers are higher with more software protection but the impact on user prices is ambiguous. A conflict between platforms and software developers over software protectio...

2016
James Marshall Gedare Bloom Gabriel Parmer Rahul Simha

Cyber-physical systems (CPSs) have stringent requirements for size, power, cost, and reaction time. Fault protection mechanisms negatively impact some or all of these considerations. We introduce a software-only framework that leverages the modular and robust design of CPSs to allow more flexibility in detecting and recovering from transient faults. We describe an implementation of this framewo...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید