Authorised domain management using location based services
Mobility '07 Proceedings of the 4th international conference on mobile technology, applications, and systems and the 1st international symposium on Computer human interaction in mobile technology
DRM domain authentication using electronic payment systems
Proceedings of the 10th international conference on Electronic commerce
Preventing information leakage between collaborating organisations
Proceedings of the 10th international conference on Electronic commerce
Sharing but Protecting Content Against Internal Leakage for Organisations
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
Digital rights management using a master control device
ASIAN'07 Proceedings of the 12th Asian computing science conference on Advances in computer science: computer and network security
Hi-index | 0.00 |
Can one legendary hacker's assault on DRM change the rules for protecting digital content?