Showing 41 - 54 results of 54 for search '"Copy protection"', query time: 1.37s Refine Results
  1. 41
    by Ann Marion, Elizabeth H. Hacking
    Published 1998-10-01
    ... standards, and experimenting with copy protection technologies. Key opportunities in emerging technology...
    Get full text
    Article
  2. 42
    by Lövgren, Alexander
    Published 2013
    ..., but discard the fact that a software without any kind of copy protection would risk not to generate any income...
    Get full text
    Others
  3. 43
    by Chien-Ju Li, 李建儒
    Published 2001
    ... in the DVD copy protection, the watermark can be used as copy control bits or embedded into video to prevent...
    Get full text
    Others
  4. 44
    by Kriukas, Julius
    Published 2013
    ... generation and copy protection is provided. Proposed method utilizes MACs based on shared keys to provide a...
    Get full text
    Dissertation
  5. 45
    by Abdallah, Emad Eddien Awad
    Published 2009
    .... Such a watermark can be used for several purposes including copyright protection, fingerprinting, copy...
    Get full text
    Get full text
    Others
  6. 46
    by Tauman Kalai, Yael
    Published 2006
    .... Obfuscation has been used for many years in attempts to prevent reverse engineering, e.g ., in copy protection...
    Get full text
    Others
  7. 47
    by Abu-Mahfouz, Adnan Mohammed
    Published 2013
    ... computing, pay-TV, and copy protection schemes for audio/video consumer products and digital cinemas. Most...
    Get full text
    Get full text
    Get full text
  8. 48
  9. 49
    ... copy-protected by their quantum nature. This paper reports on the experimental quantum optical...
    Get full text
    Article
  10. 50
    by Raižys, Artūras
    Published 2011
    ... are discussed. The information collected on the data copy-protect and cryptography as well as use security...
    Get full text
    Others
  11. 51
  12. 52
    by Lin CHIH-CHUNG, 林志忠
    Published 2005
    ... by digital technology. Digital technology makes users easier copy protected work and the copiers are almost...
    Get full text
    Others
  13. 53
    by Cheng-Hong Yao, 姚政宏
    Published 2000
    ... ironically, what is not anticipated by users is the technology of security and copy-protected of digital...
    Get full text
    Others
  14. 54
    by Thelén, Sebastian
    Published 2009
    ... to technical copy protections. When the illegal file sharing, despite different countermeasures, still...
    Get full text
    Others