Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 222,784,532 papers from all fields of science
Search
Sign In
Create Free Account
Copy protection
Known as:
Content protection
, Copy restriction
, Copy protected
Expand
Copy protection, also known as content protection, copy prevention and copy restriction, is any effort designed to prevent the reproduction of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
40-bit encryption
AIBO
Alan Wake
Atari DOS
Expand
Broader (1)
Computer access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
High-Performance Solar MPPT Using Switching Ripple Identification Based on a Lock-In Amplifier
Francisco Paz
,
M. Ordonez
IEEE transactions on industrial electronics…
2016
Corpus ID: 6415240
Photovoltaic (PV) power converters and maximum power point tracking (MPPT) algorithms are required to ensure maximum energy…
Expand
Review
2016
Review
2016
A Survey of Digital Image Watermarking Techniques
Rupali Narula
,
Meena Chaudhary
2016
Corpus ID: 212472721
Multimedia security is important for internet technology because the number of problems developed in multimedia data like…
Expand
Highly Cited
2009
Highly Cited
2009
From desktop to mobile: Examining the security experience
R. Botha
,
S. Furnell
,
N. Clarke
Computers & security
2009
Corpus ID: 18441656
Highly Cited
2009
Highly Cited
2009
Digital image source coder forensics via intrinsic fingerprints
Wei-An Lin
,
S. Tjoa
,
H. V. Zhao
,
K.J.R. Liu
IEEE Transactions on Information Forensics and…
2009
Corpus ID: 7783304
Recent development in multimedia processing and network technologies has facilitated the distribution and sharing of multimedia…
Expand
Highly Cited
2007
Highly Cited
2007
ECC Processor with Low Die Size for RFID Applications
F. Fürbass
,
J. Wolkerstorfer
IEEE International Symposium on Circuits and…
2007
Corpus ID: 8086778
This paper presents the design of a special purpose processor with elliptic curve digital signature algorithm (ECDSA…
Expand
Highly Cited
2004
Highly Cited
2004
Digital rights management in consumer electronics products
W. Jonker
,
J. Linnartz
IEEE Signal Processing Magazine
2004
Corpus ID: 2392395
In the current consumer electronics (CE) environment, we see many activities in content protection and digital rights management…
Expand
Review
2003
Review
2003
Preventing Piracy, Reverse Engineering, and Tampering
G. Naumovich
,
N. Memon
Computer
2003
Corpus ID: 15168041
With the advent of networked appliances, mobile code, and pervasive access to the Internet, software protection has gained…
Expand
Highly Cited
2002
Highly Cited
2002
Broadcast Encryption's Bright Future
J. Lotspiech
,
Stefan Nusser
,
Florian Pestoni
Computer
2002
Corpus ID: 14141706
As a vehicle for content protection, broadcast encryption promises more flexible and resilient security compared with traditional…
Expand
2002
2002
Consuming Nature: The Uneasy Relationship Between Technology, Outdoor Recreation and Protected Areas
George Wright Forum
,
J. Shultis
2002
Corpus ID: 2650583
Our culture has seldom been inclined to confront the profound changes that accompany technological innovation. Like a carrot…
Expand
Highly Cited
1997
Highly Cited
1997
On the Classification of Visual Languages by Grammar Hierarchies
K. Marriott
,
Bernd Meyer
Journal of Visual Languages and Computing
1997
Corpus ID: 6230497
Abstract Visual language specification has been investigated for more than two decades now and many different formalisms for…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE