Digital Rights Management

[1]  Robert Wilensky,et al.  A framework for distributed digital object services , 2006, International Journal on Digital Libraries.

[2]  Dirk Günnewig,et al.  Digital Rights Management , 2005, Wirtsch..

[3]  Nicholas Bloom,et al.  The Internationalisation of UK R&D , 2005 .

[4]  Frank M. Bass,et al.  A New Product Growth for Model Consumer Durables , 2004, Manag. Sci..

[5]  James Bessen,et al.  medium provided this notice is preserved. AN EMPIRICAL LOOK AT SOFTWARE PATENTS , 2004 .

[6]  Jeng-Shyang Pan,et al.  An Introduction to Watermarking Techniques , 2004 .

[7]  Hernando de Soto,et al.  The Mystery of Capital , 2004 .

[8]  Julie E. Cohen,et al.  Fair Use Infrastructure for Rights Management Systems , 2004 .

[9]  Joseph P. Liu The DMCA and the Regulation of Scientific Research , 2003 .

[10]  Ross J. Anderson Cryptography and competition policy: issues with 'trusted computing' , 2003, PODC '03.

[11]  Alan M. Frieze,et al.  A general model of web graphs , 2003, Random Struct. Algorithms.

[12]  Barbara Fox,et al.  Encouraging recognition of fair uses in DRM systems , 2003, CACM.

[13]  John S. Erickson Fair use, DRM, and trusted computing , 2003, CACM.

[14]  H. Varian BUYING, SHARING AND RENTING INFORMATION GOODS* , 2003 .

[15]  E. Rogers,et al.  Diffusion of innovations , 1964, Encyclopedia of Sport Management.

[16]  Crispin Cowan,et al.  Linux security modules: general security support for the linux kernel , 2002, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].

[17]  Fred B. Schneider,et al.  Enforceable security policies , 2000, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].

[18]  Paul F. Uhlir,et al.  Intellectual Property—When Is It the Best Incentive Mechanism for S&T Data and Information? , 2003 .

[19]  K. Weber,et al.  Kaufen oder Tauschen? Reziprozität und rationales Handeln bei Tauschvorgängen unter Freunden und in Internet-Tauschbörsen , 2003 .

[20]  Artur-Axel Wandtke,et al.  Gesetz zur Regelung des Urheberrechts in der Informationsgesellschaft , 2003 .

[21]  Padraig Dixon,et al.  The Economics of Intellectual Property: A Review to Identify Themes for Future Research , 2002 .

[22]  Larry Korba,et al.  Towards Meeting the Privacy Challenge: Adapting DRM , 2002, Digital Rights Management Workshop.

[23]  Deirdre K. Mulligan,et al.  Implementing Copyright Limitations in Rights Expression Languages , 2002, Digital Rights Management Workshop.

[24]  Darko Kirovski,et al.  Replacement Attack on Arbitrary Watermarking Systems , 2002, Digital Rights Management Workshop.

[25]  Neil Weinstock Netanel,et al.  The Commodification of Information , 2002 .

[26]  Larry Korba,et al.  Applying digital rights management systems to privacy rights management , 2002, Comput. Secur..

[27]  Heung-Kyu Lee,et al.  Robust Image Watermark Using Radon Transform and Bispectrum Invariants , 2002, Information Hiding.

[28]  Wendy J. Gordon,et al.  Market failure and intellectual property: a response to Professor Lunney , 2002 .

[29]  Andrew Huang The Trusted PC: Skin-Deep Security , 2002, Computer.

[30]  Gordon E. Lyon A Quick-Reference List of Organizations and Standards for Digital Rights Management | NIST , 2002 .

[31]  Kar Yan Tam,et al.  Understanding User Acceptance of Digital Libraries: What are the Roles of Interface Characteristics, Organizational Context, and Individual Differences? , 2002, Int. J. Hum. Comput. Stud..

[32]  Lorin M. Hitt,et al.  Measuring Switching Costs and the Determinants of Customer Retention in Internet-Enabled Businesses: A Study of the Online Brokerage Industry , 2002, Inf. Syst. Res..

[33]  Rajiv Kohli,et al.  Antecedents of B2C Channel Satisfaction and Preference: Validating e-Commerce Metrics , 2002, Inf. Syst. Res..

[34]  Kiho Yoon,et al.  The optimal level of copyright protection , 2002, Inf. Econ. Policy.

[35]  Andrew Huang,et al.  Keeping Secrets in Hardware: The Microsoft Xbox™ Case Study , 2002, CHES.

[36]  L. Bygrave Data Protection Law, Approaching Its Rationale, Logic and Limits , 2002 .

[37]  Christian S. Collberg,et al.  Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection , 2002, IEEE Trans. Software Eng..

[38]  Peter S. Fader,et al.  Fast-Track: Article Using Advance Purchase Orders to Forecast New Product Sales , 2002 .

[39]  Paul England,et al.  Authenticated Operation of Open Computing Devices , 2002, ACISP.

[40]  Ralph Katz,et al.  Shifting Innovation to Users via Toolkits , 2002, Manag. Sci..

[41]  D. Kirovski,et al.  A dual watermarking and fingerprinting system , 2002, Proceedings IEEE International Symposium on Information Theory,.

[42]  Darko Kirovski,et al.  The blind pattern matching attack on watermark systems , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[43]  P. Samuelson,et al.  The Law and Economics of Reverse Engineering , 2002 .

[44]  M. Dekimpe,et al.  The Market Valuation of Internet Channel Additions , 2002 .

[45]  Kevin M. Murphy,et al.  The Economics of Copyright ‘Fair Use’ in a Networked World , 2002 .

[46]  E. Hippel,et al.  Customers As Innovators: A New Way to Create Value , 2002 .

[47]  Eric Allamanche,et al.  MPEG-7 Scalable Robust Audio Fingerprinting , 2002 .

[48]  Timothy Roscoe,et al.  Mnemosyne: Peer-to-Peer Steganographic Storage , 2002, IPTPS.

[49]  S H Strogatz,et al.  Random graph models of social networks , 2002, Proceedings of the National Academy of Sciences of the United States of America.

[50]  Silvio Micali,et al.  Micropayments Revisited , 2002, CT-RSA.

[51]  Robert A. Gehring Software Development, Intellectual Property Rights, and IT Security , 2002 .

[52]  Antonio Rodr ´ iguez The European Software Piracy: An Empirical Application ⁄ , 2002 .

[53]  Dan Collusion-Secure Fingerprinting for Digital Data , 2002 .

[54]  Lisa N. Takeyama 1 Preliminary Piracy , Asymmetric Information , and Product Quality Revelation , 2002 .

[55]  Y. Meinhardt,et al.  Revisiting Strategy: Ein Ansatz zur Systematisierung von Geschäftsmodellen , 2002 .

[56]  T. Hess,et al.  Napster in der Videobranche? Erste Überlegungen zu Peer-to-Peer-Anwendungen für Videoinhalte , 2002 .

[57]  Ethan M. Preston,et al.  Computer Security Publications: Information Economics, Shifting Liability and the First Amendment , 2002 .

[58]  Wendy J. Gordon,et al.  Excuse and Justification in the Law of Fair Use: Commodification and Market Perspectives , 2002 .

[59]  Joachim Henkel,et al.  Open source software from commercial firms--tools, complements, and collective invention , 2002 .

[60]  Margaret Jane Radin,et al.  Online Standardization and the Integration of Text and Machine , 2002 .

[61]  Jonathan Weinberg Digital TV, Copy Control, and Public Policy , 2002 .

[62]  Richard Stallman Can you trust your computer , 2002 .

[63]  Gregorio Robles,et al.  Free/Libre and Open Source Software: Survey and Study - FLOSS FINAL REPORT , 2002 .

[64]  Molly Shaffer Van Houweling Cultivating Open Information Platforms: A Land Trust Model , 2002, J. Telecommun. High Technol. Law.

[65]  John S. Erickson,et al.  OpenDRM: A Standards Framework for Digital Rights Expression, Messaging and Enforcement , 2002 .

[66]  A. Pfitzmann,et al.  Anforderungen an die gesetzliche Regulierung zum Schutz digitaler Inhalte unter Berücksichtigung der Effektivität technischer Schutzmechanismen , 2002 .

[67]  Philip J. Weiser Law and Information Platforms , 2002, J. Telecommun. High Technol. Law.

[68]  Michel Dagenais,et al.  A Distributed Security Infrastructure for Carrier Class Linux Clusters , 2002 .

[69]  Ross J. Anderson,et al.  Security in open versus closed systems - the dance of Boltzmann , 2002 .

[70]  David R. Safford Clarifying Misinformation on TCPA , 2002 .

[71]  Janice M. Mueller,et al.  No 'Dilettante Affair': Rethinking the Experimental Use Exception to Patent Infringement for Biomedical Research Tools , 2009 .

[72]  K. Hui,et al.  Piracy and the Legitimate Demand for Recorded Music , 2002 .

[73]  Francesco Parisi,et al.  Fair Use and Copyright Protection: A Price Theory Explanation , 2002 .

[74]  Tomas Sander Golden Times for Digital Rights Management? , 2001, Financial Cryptography.

[75]  Angelos D. Keromytis,et al.  Offline Micropayments without Trusted Hardware , 2002, Financial Cryptography.

[76]  Helmut Neuschmied,et al.  Content-based identification of audio titles on the Internet , 2001, Proceedings First International Conference on WEB Delivering of Music. WEDELMUSIC 2001.

[77]  Stephen Mooney,et al.  Digital Rights Management: Business and Technology , 2001 .

[78]  Joan Feigenbaum,et al.  Privacy Engineering for Digital Rights Management Systems , 2001, Digital Rights Management Workshop.

[79]  Radek Vingralek,et al.  How to Manage Persistent State in DRM Systems , 2001, Digital Rights Management Workshop.

[80]  Dawn Xiaodong Song,et al.  A Cryptanalysis of the High-Bandwidth Digital Content Protection System , 2001, Digital Rights Management Workshop.

[81]  Jürgen Herre,et al.  Advanced Audio Identification Using MPEG-7 Content Description , 2001 .

[82]  Fan Chung Graham,et al.  Random evolution in massive graphs , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.

[83]  David R. Karger,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.

[84]  Phil Weiser Networks Unplugged: Towards A Model of Compatibility Regulation Between Information Platforms , 2001, ArXiv.

[85]  William H. Mischo,et al.  Linking to the Appropriate Copy: Report of a DOI-Based Prototype , 2001, D Lib Mag..

[86]  Min Wu,et al.  Reading Between the Lines: Lessons from the SDMI Challenge , 2001, USENIX Security Symposium.

[87]  Jacob Goldenberg,et al.  Talk of the Network: A Complex Systems Look at the Underlying Process of Word-of-Mouth , 2001 .

[88]  Nazim Fatès,et al.  Public automated web-based evaluation service for watermarking schemes: StirMark benchmark , 2001, IS&T/SPIE Electronic Imaging.

[89]  Jürgen Herre,et al.  MPEG-7 and MPEG-7 audio: An overview , 2001 .

[90]  David R. Karger,et al.  Building peer-to-peer systems with chord, a distributed lookup service , 2001, Proceedings Eighth Workshop on Hot Topics in Operating Systems.

[91]  Hal R. Varian,et al.  Circulating Libraries and Video Rental Stores , 2001, First Monday.

[92]  Jürgen Herre,et al.  AudioID: Towards Content-Based Identification of Audio Material , 2001 .

[93]  Frank Kurth,et al.  Full-Text Indexing of Very Large Audio Data Bases , 2001 .

[94]  Darko Kirovski,et al.  Robust Covert Communication over a Public Audio Channel Using Spread Spectrum , 2001, Information Hiding.

[95]  John S. Erickson Information Objects and Rights Management: A Mediation-based Approach to DRM Interoperability , 2001, D Lib Mag..

[96]  Access Control and Innovation under the Emerging EU Electronic Commerce Framework , 2001 .

[97]  Håkan J. Holm,et al.  The Computer Generation's Willingness to Pay for Originals when Pirates are Present – A CV study , 2001 .

[98]  Pm Schwartz,et al.  Beyond Lessig's Code for Internet Privacy: Cyberspace Filters, Privacy Control and Fair Information Practices , 2001 .

[99]  Yahiko Kambayashi,et al.  Representation of reuse mechanisms for digital work with multiple right-holders , 2001, Proceedings 2001 Symposium on Applications and the Internet Workshops (Cat. No.01PR0945).

[100]  Robert Mcgarvey Pay-per-view's payback: cashing in on content , 2001 .

[101]  T. Dreier,et al.  Das Verhältnis des Urheberrechts zum Vertragsrecht - Grenzen des Vertragsrechts durch Intellectual Property Law , 2001 .

[102]  John C. Knight,et al.  A security architecture for survivability mechanisms , 2001 .

[103]  P. Weiser Internet Governance, Standard Setting, and Self-Regulation , 2001 .

[104]  Ross J. Anderson Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .

[105]  Rick Harbaugh,et al.  Does Copyright Enforcement Encourage Piracy? , 2001 .

[106]  Eric R. Emch Price Discrimination via Proprietary Aftermarkets , 2000 .

[107]  Mark Bartel,et al.  Xml-Signature Syntax and Processing , 2000 .

[108]  Julie E. Cohen Copyright and the Perfect Curve , 2000 .

[109]  H. Raghav Rao,et al.  On risk, convenience, and Internet shopping behavior , 2000, CACM.

[110]  Roger Silverstone,et al.  E-Conomics: Strategies for the Digital Marketplace , 2000 .

[111]  Jaap Gordijn,et al.  Selling Bits: A Matter of Creating Consumer Value , 2000, EC-Web.

[112]  Fabien A. P. Petitcolas,et al.  Watermarking schemes evaluation , 2000, IEEE Signal Process. Mag..

[113]  Christian Neubauer,et al.  Advanced Watermarking and Its Applications , 2000 .

[114]  Nicola Guarino,et al.  Identity, Unity, and Individuality: Towards a Formal Toolkit for Ontological Analysis , 2000, ECAI.

[115]  Julie E. Cohen,et al.  Fair Use Infrastructure for Copyright Management Systems , 2000 .

[116]  G. Wornell,et al.  Quantization index modulation: a class of provably good methods for digital watermarking and information embedding , 2000, 2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060).

[117]  Masayuki Kumazawa,et al.  Relationship among copyright holders for use and reuse of digital contents , 2000, DL '00.

[118]  Jeffrey K. MacKie-Mason,et al.  Exercising Market Power in Proprietary Aftermarkets , 2000 .

[119]  Jean-Henry Morin,et al.  Agent-based commercial dissemination of electronic information , 2000, Comput. Networks.

[120]  Thierry Pun,et al.  Generalized watermarking attack based on watermark estimation and perceptual remodulation , 2000, Electronic Imaging.

[121]  Sviatoslav Voloshynovskiy,et al.  Watermark copy attack , 2000, Electronic Imaging.

[122]  J. Ginsburg From Having Copies to Experiencing Works: The Development of an Access Right in U.S. Copyright Law , 2000 .

[123]  Eric A. von Hippel,et al.  How Open Source Software Works: 'Free' User-to-User Assistance? , 2000 .

[124]  Premkumar T. Devanbu,et al.  Software engineering for security: a roadmap , 2000, ICSE '00.

[125]  Hugo Krawczyk,et al.  Design, implementation, and deployment of the iKP secure electronic payment system , 2000, IEEE Journal on Selected Areas in Communications.

[126]  E. Fehr,et al.  Fairness and Retaliation: The Economics of Reciprocity , 2000, SSRN Electronic Journal.

[127]  Ahmad-Reza Sadeghi,et al.  Self-Escrowed Cash against User Blackmailing , 2000, Financial Cryptography.

[128]  Els Van Herreweghen Non-repudiation in SET: Open Issues , 2000, Financial Cryptography.

[129]  R. Picard Changing business models of online content services: Their implications for multimedia and other content producers , 2000 .

[130]  P. Loo,et al.  Digital watermarking using complex wavelets , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[131]  P. Hugenholtz Why the Copyright Directive is Unimportant, and Possibly Invalid , 2000 .

[132]  K. J. Koelman,et al.  The Protection of Technological Measures , 2000 .

[133]  Birgit Pfitzmann,et al.  Secure and Anonymous Electronic Commerce: Providing Legal Certainty in Open Digital Systems Without , 2000 .

[134]  Lee Tien Publishing Software as a Speech Act , 2000 .

[135]  Rainer Alt,et al.  Electronic Commerce and Reduced Transaction Costs Firms ’ Migration into Highly Interconnected Electronic Markets , 2000 .

[136]  Vinton G. Cerf,et al.  What Is the Internet (and What Makes it Work) , 1999 .

[137]  M. Newman,et al.  Small Worlds: The Structure of Social Networks , 1999 .

[138]  Markus Jakobsson,et al.  Electronic Payments: Where Do We Go from Here? , 1999, CQRE.

[139]  Andrew W. Appel,et al.  Proof-carrying authentication , 1999, CCS '99.

[140]  Amnon Ta-Shma,et al.  On Anonymous Electronic Cash and Crime , 1999, ISW.

[141]  Wendy J. Gordon,et al.  Intellectual Property as Price Discrimination: Implications for Contract , 1999 .

[142]  Albert,et al.  Emergence of scaling in random networks , 1999, Science.

[143]  Bruce Schneier,et al.  The Street Performer Protocol and Digital Copyrights , 1999, First Monday.

[144]  Jean-Luc Dugelay,et al.  Fractal transform based large digital watermark embedding and robust full blind extraction , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[145]  Oz Shy,et al.  A strategic approach to software protection , 1999 .

[146]  John J. Sviokla,et al.  Exploiting the virtual value chain , 1999 .

[147]  Tim O'Reilly,et al.  Lessons from open-source software development , 1999, CACM.

[148]  Daniel J. Gervais Electronic Rights Management and Digital Identifier Systems , 1999 .

[149]  J. Hagel,et al.  Unbundling the corporation. , 1999, Harvard business review.

[150]  Mark J. Safferstone Information Rules: A Strategic Guide to the Network Economy , 1999 .

[151]  Arnold Picot,et al.  Die Internet-ökonomie: Stratagien für die Digitale Wirtschaft , 1999 .

[152]  Christopher Allen,et al.  The TLS Protocol Version 1.0 , 1999, RFC.

[153]  Kevin Crowston,et al.  Real Estate War in Cyberspace: An Emerging Electronic Market? , 1999, Electron. Mark..

[154]  Yannis Bakos,et al.  Shared Information Goods , 1999 .

[155]  Frank Rose The Economics, Concept, and Design of Information Intermediaries , 1998 .

[156]  Yiannis Tsiounis,et al.  Fair Off-Line e-cash Made Easy , 1998, ASIACRYPT.

[157]  Eric S. Raymond,et al.  Homesteading the Noosphere , 1998, First Monday.

[158]  Julie E. Cohen Lochner in Cyberspace: The New Economic Orthodoxy of 'Rights Management' , 1998 .

[159]  Michael G. Strintzis,et al.  Robust image watermarking in the subband or discrete cosine transform domain , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).

[160]  Reginald L. Lagendijk,et al.  Removing spatial spread spectrum watermarks by non-linear filtering , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).

[161]  Ennio Ottaviani,et al.  Non-invertible statistical wavelet watermarking , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).

[162]  Michael Stumm,et al.  NetCents: A Lightweight Protocol for Secure Micropayments , 1998, USENIX Workshop on Electronic Commerce.

[163]  B. Schneier,et al.  Electronic commerce and the street performer protocol , 1998 .

[164]  Duncan J. Watts,et al.  Collective dynamics of ‘small-world’ networks , 1998, Nature.

[165]  Yiannis Tsiounis,et al.  Easy Come - Easy Go Divisible Cash , 1998, EUROCRYPT.

[166]  Christian S. Collberg,et al.  Breaking abstractions and unstructuring data structures , 1998, Proceedings of the 1998 International Conference on Computer Languages (Cat. No.98CB36225).

[167]  Deepa Kundur,et al.  Digital watermarking using multiresolution wavelet decomposition , 1998, Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '98 (Cat. No.98CH36181).

[168]  Mauro Barni,et al.  A DCT-domain system for robust image watermarking , 1998, Signal Process..

[169]  Ioannis Pitas,et al.  Robust image watermarking in the spatial domain , 1998, Signal Process..

[170]  Markus G. Kuhn,et al.  Attacks on Copyright Marking Systems , 1998, Information Hiding.

[171]  Jean-Paul M. G. Linnartz,et al.  Analysis of the Sensitivity Attack against Electronic Watermarks in Images , 1998, Information Hiding.

[172]  Jerry Kang Information Privacy in Cyberspace Transactions , 1998 .

[173]  Rudolf L. van Renesse,et al.  Verifying versus falsifying banknotes , 1998 .

[174]  Larry Downes,et al.  Unleashing the Killer App: Digital Strategies for Market Dominance , 1998 .

[175]  Rafail Ostrovsky,et al.  Micropayments via Efficient Coin-Flipping , 1998, Financial Cryptography.

[176]  Jacques Traoré,et al.  An Efficient Fair Off-Line Electronic Cash System with Extensions to Checks and Wallets with Observers , 1998, Financial Cryptography.

[177]  Christine Jolls,et al.  A Behavioral Approach to Law and Economics , 1998 .

[178]  Ricarda Weber Chablis - Market Analysis of Digital Payment Systems , 1998 .

[179]  A. Kroon Protection of Copyright Management Information , 1998 .

[180]  M. Heller,et al.  Can Patents Deter Innovation , 1998 .

[181]  D. Bernhardt,et al.  Pirated for Profit , 1998 .

[182]  Lee A. Bygrave,et al.  Privacy, Data Protection and Copyright: Their Interaction in the Context of Electronic Copyright Management Systems , 1998 .

[183]  Kevin F. Kelly New Rules for the New Economy , 1998 .

[184]  Is electronic cash possible , 1998 .

[185]  Yannis Bakos,et al.  Bundling Information Goods: Pricing, Profits and Efficiency , 1998 .

[186]  Mark A. Lemley,et al.  Legal Implications of Network Economic Effects , 1998 .

[187]  Guillaume Poupard,et al.  Efficient scalable fair cash with off-line extortion prevention , 1997, ICICS.

[188]  Lisa N. Takeyama The Intertemporal Consequences of Unauthorized Reproduction of Intellectual Property1 , 1997, The Journal of Law and Economics.

[189]  Amir Herzberg,et al.  MiniPay: Charging per Plick on the Web , 1997, Comput. Networks.

[190]  Philippe A. Janson,et al.  The State of the Art in Electronic Payment Systems , 1997, Computer.

[191]  A. Picot,et al.  Information, Organization and Management: Expanding Markets and Corporate Boundaries , 1997 .

[192]  Cécile de Terwangne,et al.  Data protection and online networks , 1997, Comput. Law Secur. Rev..

[193]  Peter C. Fishburn,et al.  Fixed fee versus unit pricing for information goods: competition, equilibria, and price wars , 1997, First Monday.

[194]  Wenjun Zeng,et al.  Digital image watermarking using visual models , 1997, Electronic Imaging.

[195]  Ingemar J. Cox,et al.  Review of watermarking and the importance of perceptual modeling , 1997, Electronic Imaging.

[196]  William A. Arbaugh,et al.  A secure and reliable bootstrap architecture , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[197]  Robert H. Deng,et al.  Breaking Public Key Cryptosystems on Tamper Resistant Devices in the Presence of Transient Faults , 1997, Security Protocols Workshop.

[198]  Hsing K. Cheng,et al.  To Purchase or to Pirate Software: An Empirical Study , 1997, J. Manag. Inf. Syst..

[199]  Ronald L. Rivest,et al.  Electronic Lottery Tickets as Micropayments , 1997, Financial Cryptography.

[200]  Stanislaw Jarecki,et al.  An Efficient Micropayment System Based on Probabilistic Polling , 1997, Financial Cryptography.

[201]  Yiannis Tsiounis,et al.  Anonymity Control in E-Cash Systems , 1997, Financial Cryptography.

[202]  Markus Jakobsson,et al.  Applying Anti-Trust Policies to Increase Trust in a Versatile E-Money System , 1997, Financial Cryptography.

[203]  Reginald L. Lagendijk,et al.  Robust labeling methods for copy protection of images , 1997, Electronic Imaging.

[204]  P. Putland,et al.  Electronic payment systems , 1997 .

[205]  Julie E. Cohen A Right to Read Anonymously: A Closer Look at , 1997 .

[206]  T. Bell Fair Use Vs. Fared Use: The Impact of Automated Rights Management on Copyright's Fair Use Doctrine , 1996 .

[207]  Alan O. Freier,et al.  The SSL Protocol Version 3.0 , 1996 .

[208]  Markus G. Kuhn,et al.  Tamper resistance: a cautionary note , 1996 .

[209]  E. Gabber,et al.  Agora: a minimal distributed protocol for electronic commerce , 1996 .

[210]  Ueli Maurer,et al.  Digital Payment Systems With Passive Anonymity-Revoking Trustees , 1996, J. Comput. Secur..

[211]  Francis M. Boland,et al.  Phase watermarking of digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[212]  Bin Zhu,et al.  Robust data hiding for images , 1996, 1996 IEEE Digital Signal Processing Workshop Proceedings.

[213]  Douglas Keislar,et al.  Content-Based Classification, Search, and Retrieval of Audio , 1996, IEEE Multim..

[214]  Ahmed H. Tewfik,et al.  Digital watermarks for audio signals , 1996, 1996 8th European Signal Processing Conference (EUSIPCO 1996).

[215]  Martin Fojt,et al.  Doing business on the information superhighway , 1996, Internet Res..

[216]  Ingemar J. Cox,et al.  A Secure, Robust Watermark for Multimedia , 1996, Information Hiding.

[217]  C. Dennis Allen,et al.  User customization of a word processor , 1996, CHI.

[218]  Tatsuaki Okamoto,et al.  Practical Escrow Cash System , 1996, Security Protocols Workshop.

[219]  Adi Shamir,et al.  PayWord and MicroMint: Two Simple Micropayment Schemes , 1996, Security Protocols Workshop.

[220]  Donald V. Moser,et al.  Fairness in Ultimatum Games with Asymmetric Information and Asymmetric Payoffs , 1996 .

[221]  Torben P. Pedersen Electronic Payments of Small Amounts , 1995, Security Protocols Workshop.

[222]  Andrew Burke,et al.  How effective are international copyright conventions in the music industry? , 1996 .

[223]  Ralf Hauser,et al.  Micro-Payments based on iKP , 1996 .

[224]  Martín Abadi,et al.  The Millicent Protocol for Inexpensive Electronic Commerce , 1995, World Wide Web J..

[225]  Jan Camenisch,et al.  An efficient fair payment system , 1996, CCS '96.

[226]  Markus Jakobsson,et al.  Revokable and versatile electronic money (extended abstract) , 1996, CCS '96.

[227]  M. Yung,et al.  \indirect Discourse Proofs": Achieving Eecient Fair Oo-line E-cash , 1996 .

[228]  B. Pfitzmann,et al.  Properties of Payment Systems - General Definition Sketch and Classification , 1996 .

[229]  Tatsuaki Okamoto,et al.  An Efficient Divisible Electronic Cash Scheme , 1995, CRYPTO.

[230]  G. J. Leigh A fixation with fixation. , 1995, Science.

[231]  Marvin A. Sirbu,et al.  NetBill: an Internet commerce system optimized for network-delivered services , 1995, IEEE Wirel. Commun..

[232]  B. Clifford Neuman,et al.  Requirements for network payment: the NetCheque perspective , 1995, Digest of Papers. COMPCON'95. Technologies for the Information Superhighway.

[233]  Ernest F. Brickell,et al.  Trustee-based tracing extensions to anonymous cash and the making of anonymous change , 1995, SODA '95.

[234]  Vijay Mahajan,et al.  Software Piracy: Estimation of Lost Sales and the Impact on Software Diffusion , 1995 .

[235]  R. Wigand,et al.  Electronic Markets and Virtual Value Chains on the Information Superhighway , 1995 .

[236]  Jian Zhao,et al.  Embedding Robust Labels into Images for Copyright Protection , 1995, KnowRight.

[237]  G. Davies,et al.  A history of money : from ancient times to the present day , 1995 .

[238]  C. F. Osborne,et al.  A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.

[239]  Sanjoy Paul,et al.  Anonymous credit cards , 1994, CCS '94.

[240]  Lisa N. Takeyama The Welfare Implications of Unauthorized Reproduction of Intellectual Property in the Presence of Demand Network Externalities , 1994 .

[241]  Stephen E. Margolis,et al.  Network externality : an uncommon tragedy , 1994 .

[242]  C. Shapiro,et al.  Systems Competition and Network Effects , 1994 .

[243]  L. Taylor Telecommunications Demand in Theory and Practice , 1994 .

[244]  B. Clifford Neuman,et al.  NetCash: a design for practical electronic currency on the Internet , 1993, CCS '93.

[245]  Georg Franck,et al.  Ökonomie der Aufmerksamkeit , 1993 .

[246]  Stefan A. Brands,et al.  Untraceable Off-line Cash in Wallets with Observers (Extended Abstract) , 1993, CRYPTO.

[247]  Stefan A. Brands,et al.  An Efficient Off-line Electronic Cash System Based On The Representation Problem. , 1993 .

[248]  David Naccache,et al.  On blind signatures and perfect crimes , 1992, Comput. Secur..

[249]  David Chaum,et al.  Transferred Cash Grows in Size , 1992, EUROCRYPT.

[250]  Tatsuaki Okamoto,et al.  Universal Electronic Cash , 1991, CRYPTO.

[251]  Wendy E. Mackay,et al.  Triggers and barriers to customizing software , 1991, CHI.

[252]  K. R. Conner,et al.  Software piracy: an analysis of protection strategies , 1991 .

[253]  K. Tanaka,et al.  Embedding secret information into a dithered multi-level image , 1990, IEEE Conference on Military Communications.

[254]  Michael E. Porter,et al.  The Competitive Advantage of Nations. , 1990 .

[255]  R. Nelson,et al.  On the Complex Economics of Patent Scope , 1990 .

[256]  Daniel A. Levinthal,et al.  ABSORPTIVE CAPACITY: A NEW PERSPECTIVE ON LEARNING AND INNOVATION , 1990 .

[257]  Birgit Pfitzmann,et al.  Rechtssicherheit trotz Anonymität in offenen digitalen Systemen , 1990 .

[258]  Vijay Mahajan,et al.  New Product Diffusion Models in Marketing: A Review and Directions for Research: , 1990 .

[259]  R. Mori,et al.  Superdistribution : the concept and the architecture , 1990 .

[260]  S. Besen,et al.  Private Copying, Appropriability, and Optimal Copying Royalties , 1989, The Journal of Law and Economics.

[261]  Kazuo Ohta,et al.  Disposable Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash , 1989, CRYPTO.

[262]  R. Posner,et al.  An Economic Analysis of Copyright Law , 1989, The Journal of Legal Studies.

[263]  Amos Fiat,et al.  Untraceable Electronic Cash , 1990, CRYPTO.

[264]  Jeffrey I. Schiller,et al.  An Authentication Service for Open Network Systems. In , 1998 .

[265]  JoAnne Yates,et al.  Electronic markets and electronic hierarchies , 1987, CACM.

[266]  S. Besen Private copying, reproduction costs, and the supply of intellectual property , 1986 .

[267]  R. Wittmann,et al.  Deutsche Urheber- und Verlagsrechtsgeschichte zwischen 1450 und 1850 , 1986 .

[268]  S. Liebowitz Copying and Indirect Appropriability: Photocopying of Journals , 1985, Journal of Political Economy.

[269]  William R. Johnson,et al.  The Economics of Copying , 1985, Journal of Political Economy.

[270]  K. H. Barratt Digital Coding of Waveforms , 1985 .

[271]  C. Shapiro,et al.  Network Externalities, Competition, and Compatibility , 1985 .

[272]  V. Mahajan,et al.  Introduction Strategy for New Products with Positive and Negative Word-of-Mouth , 1984 .

[273]  Michael Waldman,et al.  The Effects of Increased Copyright Protection: An Analytic Approach , 1984, Journal of Political Economy.

[274]  R. Pinto La liberté d'information et d'opinion en droit international , 1984 .

[275]  Manuel Blum,et al.  Coin flipping by telephone a protocol for solving impossible problems , 1983, SIGA.

[276]  L. B. Milstein,et al.  Theory of Spread-Spectrum Communications - A Tutorial , 1982, IEEE Transactions on Communications.

[277]  L. G. Tornatzky,et al.  Innovation characteristics and innovation adoption-implementation: A meta-analysis of findings , 1982, IEEE Transactions on Engineering Management.

[278]  S. Bok Secrets: On the Ethics of Concealment and Revelation , 1982 .

[279]  O. Williamson The Economics of Organization: The Transaction Cost Approach , 1981, American Journal of Sociology.

[280]  O. Williamson The Modern Corporation: Origins, Evolution, Attributes , 1981 .

[281]  Mancur Olson,et al.  Die Logik des kollektiven Handelns. Kollektivgüter und die Theorie der Gruppen , 1979 .

[282]  J. Ordover,et al.  On the optimal provision of journals qua sometimes shared goods. , 1978, The American economic review.

[283]  O. Williamson Markets and hierarchies, analysis and antitrust implications : a study in the economics of internal organization , 1975 .

[284]  G. Calabresi,et al.  Property Rules, Liability Rules, and Inalienability: One View of the Cathedral , 1972 .

[285]  Yoram Barzel,et al.  Optimal Timing of Innovations , 1968 .

[286]  K. Arrow Economic Welfare and the Allocation of Resources for Invention , 1962 .

[287]  R. Coase The Nature of the Firm , 1937 .

[288]  Rudolph Sohm Institutionen : Geschichte und System des römischen Privatrechts , 1908 .