This book constitutes the thoroughly refereed post-proceedings of the Second International Workshop on Digital Rights Management, DRM 2002, held in Washington, DC, USA, in November 2002, in conjunction with ACM CCS-9.
The 13 revised full papers presented were carefully reviewed and selected for inclusion in the book. Among the topics addressed are DES implementation for DRM applications, cryptographic attacks, industrial challenges, public key broadcast encryption, fingerprinting, copy-prevention techniques, copyright limitations, content protection, watermarking systems, and theft-protected proprietary certificates.
Author(s): Stanley Chow, Phil Eisen, Harold Johnson, Paul C. van Oorschot (auth.), Joan Feigenbaum (eds.)
Series: Lecture Notes in Computer Science 2696
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2003
Language: English
Pages: 222
Tags: Data Encryption; Computer Communication Networks; Operating Systems; Computers and Society; Legal Aspects of Computing; Management of Computing and Information Systems
Front Matter....Pages -
A White-Box DES Implementation for DRM Applications....Pages 1-15
Attacking an Obfuscated Cipher by Injecting Faults....Pages 16-31
Breaking and Repairing Asymmetric Public-Key Traitor Tracing....Pages 32-50
Key Challenges in DRM: An Industry Perspective....Pages 51-60
Public Key Broadcast Encryption for Stateless Receivers....Pages 61-80
Traitor Tracing for Shortened and Corrupted Fingerprints....Pages 81-100
Evaluating New Copy-Prevention Techniques for Audio CDs....Pages 101-117
Towards Meeting the Privacy Challenge: Adapting DRM....Pages 118-136
Implementing Copyright Limitations in Rights Expression Languages....Pages 137-154
The Darknet and the Future of Content Protection....Pages 155-176
Replacement Attack on Arbitrary Watermarking Systems....Pages 177-189
FAIR: Fair Audience InfeRence....Pages 190-207
Theft-Protected Proprietary Certificates....Pages 208-220
Back Matter....Pages -