Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,975,217 papers from all fields of science
Search
Sign In
Create Free Account
Copy protection
Known as:
Content protection
, Copy restriction
, Copy protected
Expand
Copy protection, also known as content protection, copy prevention and copy restriction, is any effort designed to prevent the reproduction of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
40-bit encryption
AIBO
Alan Wake
Atari DOS
Expand
Broader (1)
Computer access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
A New Approach to Partial Image Encryption
B. Parameshachari
,
K. M. S. Soyjaudah
2013
Corpus ID: 59906706
The traffic of digital images and video has grown rapidly in the internet. Security becomes important for several applications…
Expand
Review
2011
Review
2011
Our Country Our Way: Guidelines for Australian Indigenous Protected Area Management Plans
R. Hill
,
F. Walsh
,
J. Davies
,
M. Sandford
2011
Corpus ID: 130769847
Little guidance has been available about how the distinctive socio-cultural characteristics of Indigenous Protected Areas can be…
Expand
2009
2009
Hope for the Future - The Asylum Claims of Women Fleeing Sexual Violence in Guatemala
Allison W. Reimann
2009
Corpus ID: 55986861
INTRODUCTION 1199 I. VIOLENCE AGAINST WOMEN IN GUATEMALA 1207 II. UNITED STATES ASYLUM LAW AND SEXUAL VIOLENCE 1215 A. A Well…
Expand
2006
2006
A QUALITATIVE ANALYSIS OF JAVA OBFUSCATION
Matthew T. Karnick
,
J. MacBride
,
Sean W. McGinnis
,
Ying Tang
,
R. Ramachandran
2006
Corpus ID: 17297863
Code obfuscation is a promising defense technology that secures software in a way that makes the cost of reverse engineering…
Expand
2004
2004
Eficácia de gestão de unidades de conservação gerenciadas pelo Instituto Florestal de São Paulo, Brasil
Helder Henrique de Faria
2004
Corpus ID: 150736484
For many authors, the conservation units (UCs) or protected areas are or will be the last bastions of the strict conservation of…
Expand
2003
2003
No Place to Hide:: Effects of Climate Change on Protected Areas
J. Ervin
2003
Corpus ID: 127062785
This paper considers the potential impacts of climate change on protected areas (PAs) and actions that can be taken to mitigate…
Expand
Review
1995
Review
1995
Development after physical abuse in early childhood a follow-up study of children on protection registers
J. Gibbons
,
B. Gallagher
,
C. Bell
,
D. Gordon
1995
Corpus ID: 70607946
Introduction - Aims of the Study Part One - Consequences of Physical Maltreatment: The development of children nine to ten years…
Expand
Highly Cited
1987
Highly Cited
1987
ABYSS: ATrusted Architecture for Software Protection
Steve R. White
,
L. Comerford
IEEE Symposium on Security and Privacy
1987
Corpus ID: 11898158
ABYSS (A Basic Yorktown Security System) is an architecture for the trusted execution of application software. It supports a…
Expand
1986
1986
Towards a Theory of Software Protection
Oded Goldreich
Annual International Cryptology Conference
1986
Corpus ID: 41242697
Software protection is one of the most important issues concerning computer practice. The problem is to sell programs that can be…
Expand
1975
1975
A History of Unequal Treatment: The Qualifications of Handicapped Persons as a Suspect Class under the Equal Protection Clause
M. Burgdorf
,
R. Burgdorf
1975
Corpus ID: 153408585