How DRM-based content delivery systems disrupt expectations of "personal use"
Proceedings of the 3rd ACM workshop on Digital rights management
The deceptive behaviors that offend us most about spyware
Communications of the ACM - Spyware
Fairer usage contracts for DRM
Proceedings of the 5th ACM workshop on Digital rights management
Vicarious infringement creates a privacy ceiling
Proceedings of the ACM workshop on Digital rights management
A trustworthy end-to-end key management scheme for digital rights management
MULTIMEDIA '06 Proceedings of the 14th annual ACM international conference on Multimedia
Model-oriented analysis of user - right holder relations and possible impacts of DRM
Information Services and Use
Assessing privacy criteria for drm using eu privacy legislation
Proceedings of the 8th ACM workshop on Digital rights management
Problem Analyses and Recommendations in DRM Security Policies
EuroISI '08 Proceedings of the 1st European Conference on Intelligence and Security Informatics
Ontologies for intellectual property rights protection
Expert Systems with Applications: An International Journal
Access policy based key management in multi-level multi-distributor DRM architecture
InfoSecHiComNet'11 Proceedings of the First international conference on Security aspects in information technology
Information Systems and e-Business Management
Protecting intellectual property rights and the JPEG2000 coding standard
PCI'05 Proceedings of the 10th Panhellenic conference on Advances in Informatics
Design and development challenges for an E2E DRM content business integration platform
International Journal of Information Management: The Journal for Information Professionals
Privacy rights management in multiparty multilevel DRM system
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
Digital forensics for enterprise rights management systems
Proceedings of the 14th International Conference on Information Integration and Web-based Applications & Services
Proxy re-encryption in a privacy-preserving cloud computing DRM scheme
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
Functional Modelling and Analysis of IDM E-Tailer Platforms
International Journal of E-Business Research
E-books on the mobile e-reader
Mobile Information Systems
Hi-index | 0.01 |
How should the law respond to DRM restrictions that invade user privacy?