نتایج جستجو برای: minute pirate bug
تعداد نتایج: 66771 فیلتر نتایج به سال:
Traitor tracing is an important tool to discourage defrauders from illegally broadcasting multimedia content. However, the main techniques consist in tracing the traitors from the pirate decoders they built from the secret keys of dishonest registered users: with either a black-box or a white-box tracing procedure on the pirate decoder, one hopes to trace back one of the traitors who registered...
We explore the problem of proving ownership or origin of multimedia content like image / video or audio signals through watermarking. The need for watermarking arises out of the unsuitability of present copyright laws for claiming ownership of digital content. Watermarking schemes however, are threatened by counterfeit attacks, which primarily use the freedom available in the choice of signatur...
Key-Policy Attribute-Based Encryption (KP-ABE) is a promising cryptographic primitive which enables fine-grained access control over sensitive data. However, key abuse attacks in KP-ABE may impede its wide application especially in copyright-sensitive systems. To defend against this kind of attacks, this paper proposes a novel KP-ABE scheme which is able to disclose any illegal key distributor’...
The Philippines is rapidly becoming a central battlefield in the increasingly intense campaign against optical media piracy in Southeast Asia; but the country remains ill-prepared to fight this battle. Pirate production capacity in the Philippines continues to increase, as pirate syndicates flee less hospitable jurisdictions; both imports and exports of unauthorized digital copies move freely a...
A traitor tracing scheme is a multi-receiver encryption scheme where malicious receiver coalitions aiming at building pirate decryption devices are deterred by the existence of a tracing algorithm: Using the pirate decryption device, the tracing algorithm can recover at least one member of the malicious coalition. All existing traitor tracing schemes rely either on rather inefficient generic co...
There is an ongoing public policy debate regarding the role search engines can play in anti-piracy efforts. However, for any sensible policy discussion it must first be the case that changes in search results can influence consumers’ decisions to pirate or purchase legally. Surprisingly, there is little empirical evidence on this important policy issue. To analyze this question, we design a cus...
With a great number of software products that have been developed, bug fixing is difficult due to a large number of submitted bug reports each day. Sometimes developers usually describe the same errors in the different bug reports, these bug reports are called duplicate bug reports, the increasing number of duplicates lead to a large amount of time and effort for identifying and analyzing bug r...
Interpreting sentences spoken in a second language can be demanding and plagued with uncertainty, especially for lower proficiency listeners. While native language listeners use numerous information sources to anticipate upcoming words accurately, the pattern of anticipation may be different for second language users. We explore this issue in bilinguals with varying English proficiency by recor...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید