Skip to search formSkip to main contentSkip to account menu

Copy protection

Known as: Content protection, Copy restriction, Copy protected 
Copy protection, also known as content protection, copy prevention and copy restriction, is any effort designed to prevent the reproduction of… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Oblivious RAM (ORAM) is a cryptographic primitive that hides memory access patterns to untrusted storage. ORAM may be used in… 
2013
2013
The traffic of digital images and video has grown rapidly in the internet. Security becomes important for several applications… 
2007
2007
In software protection we typically have to deal with the white-box attack model. In this model an attacker is assumed to have… 
Review
2005
Review
2005
In 2002, we began tagging macrofauna and established an array of hydrophones in the Mullica River and Great Bay estuary in… 
Highly Cited
2004
Highly Cited
2004
In the current consumer electronics (CE) environment, we see many activities in content protection and digital rights management… 
2004
2004
Intellectual property (IP) reuse based design is one of the most promising techniques to close the so-called design productivity… 
2002
2002
Our culture has seldom been inclined to confront the profound changes that accompany technological innovation. Like a carrot… 
2002
2002
This article discusses the rhetoric of the highly publicised Napster legal cases, arguing that it is firmly based in the… 
Highly Cited
1997
Highly Cited
1997
Abstract Visual language specification has been investigated for more than two decades now and many different formalisms for… 
Highly Cited
1987
Highly Cited
1987
ABYSS (A Basic Yorktown Security System) is an architecture for the trusted execution of application software. It supports a…