Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,079,389 papers from all fields of science
Search
Sign In
Create Free Account
Copy protection
Known as:
Content protection
, Copy restriction
, Copy protected
Expand
Copy protection, also known as content protection, copy prevention and copy restriction, is any effort designed to prevent the reproduction of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
40-bit encryption
AIBO
Alan Wake
Atari DOS
Expand
Broader (1)
Computer access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
A New Approach to Partial Image Encryption
B. Parameshachari
,
K. M. S. Soyjaudah
2013
Corpus ID: 59906706
The traffic of digital images and video has grown rapidly in the internet. Security becomes important for several applications…
Expand
2009
2009
GenLM: License Management for Grid and Cloud Computing Environments
M. Dalheimer
,
F. Pfreundt
9th IEEE/ACM International Symposium on Cluster…
2009
Corpus ID: 16813347
Software license management allows independent software vendors (ISVs) to control the access of their products. It is a…
Expand
2008
2008
FPGA-based Ultra-Low Latency HIL Fault Testing of a Permanent Magnet Motor Drive using RT-LAB-XSG
C. Dufour
,
J. Bélanger
,
V. Lapointe
Joint International Conference on Power System…
2008
Corpus ID: 11204399
Presented is a real-time simulator of a permanent magnet synchronous motor (PMSM) drive implemented on an FPGA card. Real-time…
Expand
2007
2007
Mechanism for software tamper resistance: an application of white-box cryptography
Wil Michiels
,
Paul Gorissen
ACM Digital Rights Management Workshop
2007
Corpus ID: 5758757
In software protection we typically have to deal with the white-box attack model. In this model an attacker is assumed to have…
Expand
Review
2005
Review
2005
An estuarine observatory for real‐time telemetry of migrant macrofauna: Design, performance, and constraints
T. Grothues
,
K. Able
,
J. McDonnell
,
M. Sisak
2005
Corpus ID: 55460673
In 2002, we began tagging macrofauna and established an array of hydrophones in the Mullica River and Great Bay estuary in…
Expand
Highly Cited
2004
Highly Cited
2004
Digital rights management in consumer electronics products
W. Jonker
,
J. Linnartz
IEEE Signal Processing Magazine
2004
Corpus ID: 2392395
In the current consumer electronics (CE) environment, we see many activities in content protection and digital rights management…
Expand
2004
2004
Soft IP Protection: Watermarking HDL Codes
Lin Yuan
,
Pushkin R. Pari
,
G. Qu
Information Hiding
2004
Corpus ID: 11599197
Intellectual property (IP) reuse based design is one of the most promising techniques to close the so-called design productivity…
Expand
2002
2002
Consuming Nature: The Uneasy Relationship Between Technology, Outdoor Recreation and Protected Areas
George Wright Forum
,
J. Shultis
2002
Corpus ID: 2650583
Our culture has seldom been inclined to confront the profound changes that accompany technological innovation. Like a carrot…
Expand
Highly Cited
1997
Highly Cited
1997
On the Classification of Visual Languages by Grammar Hierarchies
K. Marriott
,
Bernd Meyer
Journal of Visual Languages and Computing
1997
Corpus ID: 6230497
Abstract Visual language specification has been investigated for more than two decades now and many different formalisms for…
Expand
1975
1975
A History of Unequal Treatment: The Qualifications of Handicapped Persons as a Suspect Class under the Equal Protection Clause
M. Burgdorf
,
R. Burgdorf
1975
Corpus ID: 153408585
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE