Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,360,380 papers from all fields of science
Search
Sign In
Create Free Account
Advanced Access Content System
Known as:
AACS key
, Managed Copy
, Volume Identifier
Expand
The Advanced Access Content System (AACS) is a standard for content distribution and digital rights management, intended to restrict access to and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
24 relations
.m2ts
AACS encryption key controversy
Blu-ray
Content Scramble System
Expand
Broader (1)
Broadcast encryption
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2018
Review
2018
Exploration EMU Outer Mold Line Config Control CAD model User's Guide
A. L. Ellison
2018
Corpus ID: 196057392
The Exploration EMU (xEMU) CAD model is a configuration controlled and managed copy of the development xEMU system prior to…
Expand
2012
2012
Enhanced UBI layer for fast boot-up times of mobile consumer devices
Dongwook Kang
IEEE transactions on consumer electronics
2012
Corpus ID: 37158180
Due to its short mounting time, the Unsorted Block Image File System (UBIFS) allows mobile consumer devices to boot up faster…
Expand
2011
2011
Disk recording medium and recorder device of disk recording medium and method of copying disk recording medium
永井 裕
,
赤星 健司
,
安川 貴清
2011
Corpus ID: 196150553
With regard to managed copy, if each copy source disk can be individually identified, it is possible to acquire information such…
Expand
2009
2009
Terminal device, server device, and information processing method used therefor
並木 剛
,
健志 幸田
,
稲垣 勝利
,
昌義 吉田
2009
Corpus ID: 196013746
A terminal device is configured so as to replay and record contents. The terminal device replays and records an optical disk with…
Expand
2009
2009
Managed copy method for protected contents, device using the managed copy method, and information recording medium used for the managed copy method
拓樹 加藤
,
和人 黒田
,
森下 直樹
,
裕治 佐藤
,
伸一 松川
,
尚志 山田
2009
Corpus ID: 188246199
A function of superposing or writing information which cannot be deleted later on or to a copy source disk is installed in a…
Expand
2008
2008
NIBFS The Non-Indexed Blob File System A High-Efficiency , Capability-Based , Storage System for Archival Websites
T. Jeremy
2008
Corpus ID: 18757251
Image archival is a popular and high profile Web 2.0 service. We have examined the problem domain of internet archival websites…
Expand
2006
2006
Practical Forensic Analysis in Advanced Access Content System
Hongxia Jin
,
J. Lotspiech
Information Security Practice and Experience
2006
Corpus ID: 20376865
In this paper we focus on the use of a traitor tracing scheme for distribution models that are one-to-many. It can be a networked…
Expand
2006
2006
Practical “Traitor Tracing”
Hongxia Jin
,
J. Lotspiech
2006
Corpus ID: 58373049
2006
2006
DRM Standard Activities
Xin Wang
,
Zhongyang Huang
,
Shengmei Shen
2006
Corpus ID: 64356714
2005
2005
Method of storing metadata from data medium in reproducing device
Хие-Дзеонг Чун
,
Дзунг-ван Ко
2005
Corpus ID: 64505364
FIELD: information technology. SUBSTANCE: in the method, metadata are read from a data medium and then stored in a reproducing…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE