Suggested Topics within your search.
Suggested Topics within your search.
-
41“... standards, and experimenting with copy protection technologies. Key opportunities in emerging technology...”
Get full text
Article -
42DRM - utveckling, konflikter och framtid : konsumenters reaktioner på och företags användande av DRMby Lövgren, Alexander“..., but discard the fact that a software without any kind of copy protection would risk not to generate any income...”
Published 2013
Get full text
Others -
43“... in the DVD copy protection, the watermark can be used as copy control bits or embedded into video to prevent...”
Get full text
Others -
44by Kriukas, Julius“... generation and copy protection is provided. Proposed method utilizes MACs based on shared keys to provide a...”
Published 2013
Get full text
Dissertation -
45by Abdallah, Emad Eddien Awad“.... Such a watermark can be used for several purposes including copyright protection, fingerprinting, copy...”
Published 2009
Get full text
Get full text
Others -
46by Tauman Kalai, Yael“.... Obfuscation has been used for many years in attempts to prevent reverse engineering, e.g ., in copy protection...”
Published 2006
Get full text
Others -
47by Abu-Mahfouz, Adnan Mohammed“... computing, pay-TV, and copy protection schemes for audio/video consumer products and digital cinemas. Most...”
Published 2013
Get full text
Get full text
Get full text
-
48by Σπανού, Ελένη“..., faxes, wireless computing, pay-TV, and copy protection schemes for audio/video consumer products...”
Published 2011
Get full text
-
49by Karol Bartkiewicz, Antonín Černoch, Grzegorz Chimczak, Karel Lemr, Adam Miranowicz, Franco Nori“... copy-protected by their quantum nature. This paper reports on the experimental quantum optical...”
Published 2017-03-01
Get full text
Article -
50by Raižys, Artūras“... are discussed. The information collected on the data copy-protect and cryptography as well as use security...”
Published 2011
Get full text
Others -
51by Guertin, David A., Stevens, Deanna M., Saitoh, Maki, Kinkel, Stephanie, Crosby, Katherine, Sheen, Joon-Ho, Mullholland, David J., Magnuson, Mark A., Wu, Hong, Sabatini, David, Stevens, Deanna M.Get fulltext
Published 2015
Article -
52“... by digital technology. Digital technology makes users easier copy protected work and the copiers are almost...”
Get full text
Others -
53“... ironically, what is not anticipated by users is the technology of security and copy-protected of digital...”
Get full text
Others -
54by Thelén, Sebastian“... to technical copy protections. When the illegal file sharing, despite different countermeasures, still...”
Published 2009
Get full text
Others