CCS
13 years 10 months ago
2001 ACM
Abstract. Protection of software code against illegitimate modifications by its users is a pressing issue to many software developers. Many software-based mechanisms for protectin...
CCS
13 years 10 months ago
2001 ACM
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
CCS
13 years 10 months ago
2001 ACM
Abstract. We describe a weakness in the High Bandwidth Digital Content Protection (HDCP) scheme which may lead to practical attacks. HDCP is a proposed identity-based cryptosystem ...
CCS
13 years 10 months ago
2001 ACM CCS
13 years 10 months ago
2001 ACM
This paper will examine and categorize potential business model scenarios for online music. The virtualization of music leads to market uncertainties. On the supply side, the offer...
|