Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,321,451 papers from all fields of science
Search
Sign In
Create Free Account
Copy protection
Known as:
Content protection
, Copy restriction
, Copy protected
Expand
Copy protection, also known as content protection, copy prevention and copy restriction, is any effort designed to prevent the reproduction of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
40-bit encryption
AIBO
Alan Wake
Atari DOS
Expand
Broader (1)
Computer access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Movement out of focus
M. Erlewine
2014
Corpus ID: 60608414
This dissertation investigates the consequences of overt and covert movement on association with focus. The interpretation of…
Expand
2013
2013
A New Approach to Partial Image Encryption
B. Parameshachari
,
K. M. S. Soyjaudah
2013
Corpus ID: 59906706
The traffic of digital images and video has grown rapidly in the internet. Security becomes important for several applications…
Expand
2011
2011
Promoting improved rainwater and landmanagement in the Blue Nile (Abay) basinof Ethiopia.
D. Merrey
,
Tadele Gebreselassie
2011
Corpus ID: 127925525
Report prepared for the Challenge Program on Water and Food (CPWF) Nile Basin Development Challenge Project 1
2007
2007
Mechanism for software tamper resistance: an application of white-box cryptography
Wil Michiels
,
Paul Gorissen
ACM Digital Rights Management Workshop
2007
Corpus ID: 5758757
In software protection we typically have to deal with the white-box attack model. In this model an attacker is assumed to have…
Expand
Review
2005
Review
2005
An estuarine observatory for real‐time telemetry of migrant macrofauna: Design, performance, and constraints
T. Grothues
,
K. Able
,
J. McDonnell
,
M. Sisak
2005
Corpus ID: 55460673
In 2002, we began tagging macrofauna and established an array of hydrophones in the Mullica River and Great Bay estuary in…
Expand
Highly Cited
2004
Highly Cited
2004
Digital rights management in consumer electronics products
W. Jonker
,
J. Linnartz
IEEE Signal Processing Magazine
2004
Corpus ID: 2392395
In the current consumer electronics (CE) environment, we see many activities in content protection and digital rights management…
Expand
2003
2003
If Piracy Is the Problem, Is DRM the Answer?
S. Haber
,
Bill G. Horne
,
J. Pato
,
T. Sander
,
R. Tarjan
ACM Digital Rights Management Workshop
2003
Corpus ID: 14583238
Piracy of digital content is considered a serious problem by content companies. Digital Rights Management is considered a…
Expand
2002
2002
Consuming Nature: The Uneasy Relationship Between Technology, Outdoor Recreation and Protected Areas
George Wright Forum
,
J. Shultis
2002
Corpus ID: 2650583
Our culture has seldom been inclined to confront the profound changes that accompany technological innovation. Like a carrot…
Expand
Highly Cited
1997
Highly Cited
1997
On the Classification of Visual Languages by Grammar Hierarchies
K. Marriott
,
Bernd Meyer
Journal of Visual Languages and Computing
1997
Corpus ID: 6230497
Abstract Visual language specification has been investigated for more than two decades now and many different formalisms for…
Expand
Highly Cited
1987
Highly Cited
1987
ABYSS: ATrusted Architecture for Software Protection
Steve R. White
,
L. Comerford
IEEE Symposium on Security and Privacy
1987
Corpus ID: 11898158
ABYSS (A Basic Yorktown Security System) is an architecture for the trusted execution of application software. It supports a…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE