142
click to vote
CCS
15 years 8 months ago
2001 ACM
Abstract. Protection of software code against illegitimate modifications by its users is a pressing issue to many software developers. Many software-based mechanisms for protectin...
124
click to vote
CCS
15 years 8 months ago
2001 ACM
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
121
Voted
CCS
15 years 8 months ago
2001 ACM
Abstract. We describe a weakness in the High Bandwidth Digital Content Protection (HDCP) scheme which may lead to practical attacks. HDCP is a proposed identity-based cryptosystem ...
100
Voted
CCS
15 years 8 months ago
2001 ACM 127
click to vote
CCS
15 years 8 months ago
2001 ACM
This paper will examine and categorize potential business model scenarios for online music. The virtualization of music leads to market uncertainties. On the supply side, the offer...
|