Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,397,760 papers from all fields of science
Search
Sign In
Create Free Account
Copy protection
Known as:
Content protection
, Copy restriction
, Copy protected
Expand
Copy protection, also known as content protection, copy prevention and copy restriction, is any effort designed to prevent the reproduction of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
40-bit encryption
AIBO
Alan Wake
Atari DOS
Expand
Broader (1)
Computer access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Unified Oblivious-RAM: Improving Recursive ORAM with Locality and Pseudorandomness
Ling Ren
,
Christopher W. Fletcher
,
Xiangyao Yu
,
Albert Kwon
,
Marten van Dijk
,
S. Devadas
IACR Cryptology ePrint Archive
2014
Corpus ID: 11373385
Oblivious RAM (ORAM) is a cryptographic primitive that hides memory access patterns to untrusted storage. ORAM may be used in…
Expand
2013
2013
A New Approach to Partial Image Encryption
B. Parameshachari
,
K. M. S. Soyjaudah
2013
Corpus ID: 59906706
The traffic of digital images and video has grown rapidly in the internet. Security becomes important for several applications…
Expand
2007
2007
Mechanism for software tamper resistance: an application of white-box cryptography
Wil Michiels
,
Paul Gorissen
ACM Digital Rights Management Workshop
2007
Corpus ID: 5758757
In software protection we typically have to deal with the white-box attack model. In this model an attacker is assumed to have…
Expand
Review
2005
Review
2005
An estuarine observatory for real‐time telemetry of migrant macrofauna: Design, performance, and constraints
T. Grothues
,
K. Able
,
J. McDonnell
,
M. Sisak
2005
Corpus ID: 55460673
In 2002, we began tagging macrofauna and established an array of hydrophones in the Mullica River and Great Bay estuary in…
Expand
Highly Cited
2004
Highly Cited
2004
Digital rights management in consumer electronics products
W. Jonker
,
J. Linnartz
IEEE Signal Processing Magazine
2004
Corpus ID: 2392395
In the current consumer electronics (CE) environment, we see many activities in content protection and digital rights management…
Expand
2004
2004
Soft IP Protection: Watermarking HDL Codes
Lin Yuan
,
Pushkin R. Pari
,
G. Qu
Information Hiding
2004
Corpus ID: 11599197
Intellectual property (IP) reuse based design is one of the most promising techniques to close the so-called design productivity…
Expand
2002
2002
Consuming Nature: The Uneasy Relationship Between Technology, Outdoor Recreation and Protected Areas
George Wright Forum
,
J. Shultis
2002
Corpus ID: 2650583
Our culture has seldom been inclined to confront the profound changes that accompany technological innovation. Like a carrot…
Expand
2002
2002
Metallica and morality: The rhetorical battleground of the Napster wars
Lee K R Marshall
2002
Corpus ID: 146750768
This article discusses the rhetoric of the highly publicised Napster legal cases, arguing that it is firmly based in the…
Expand
Highly Cited
1997
Highly Cited
1997
On the Classification of Visual Languages by Grammar Hierarchies
K. Marriott
,
Bernd Meyer
Journal of Visual Languages and Computing
1997
Corpus ID: 6230497
Abstract Visual language specification has been investigated for more than two decades now and many different formalisms for…
Expand
Highly Cited
1987
Highly Cited
1987
ABYSS: ATrusted Architecture for Software Protection
Steve R. White
,
L. Comerford
IEEE Symposium on Security and Privacy
1987
Corpus ID: 11898158
ABYSS (A Basic Yorktown Security System) is an architecture for the trusted execution of application software. It supports a…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE