Skip to search formSkip to main contentSkip to account menu

Copy protection

Known as: Content protection, Copy restriction, Copy protected 
Copy protection, also known as content protection, copy prevention and copy restriction, is any effort designed to prevent the reproduction of… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
The traffic of digital images and video has grown rapidly in the internet. Security becomes important for several applications… 
Review
2011
Review
2011
Little guidance has been available about how the distinctive socio-cultural characteristics of Indigenous Protected Areas can be… 
2009
2009
INTRODUCTION 1199 I. VIOLENCE AGAINST WOMEN IN GUATEMALA 1207 II. UNITED STATES ASYLUM LAW AND SEXUAL VIOLENCE 1215 A. A Well… 
2006
2006
Code obfuscation is a promising defense technology that secures software in a way that makes the cost of reverse engineering… 
2004
2004
For many authors, the conservation units (UCs) or protected areas are or will be the last bastions of the strict conservation of… 
2003
2003
This paper considers the potential impacts of climate change on protected areas (PAs) and actions that can be taken to mitigate… 
Review
1995
Review
1995
Introduction - Aims of the Study Part One - Consequences of Physical Maltreatment: The development of children nine to ten years… 
Highly Cited
1987
Highly Cited
1987
ABYSS (A Basic Yorktown Security System) is an architecture for the trusted execution of application software. It supports a… 
1986
1986
Software protection is one of the most important issues concerning computer practice. The problem is to sell programs that can be…