Digital Rights Management
暂无分享,去创建一个
[1] Robert Wilensky,et al. A framework for distributed digital object services , 2006, International Journal on Digital Libraries.
[2] Dirk Günnewig,et al. Digital Rights Management , 2005, Wirtsch..
[3] Nicholas Bloom,et al. The Internationalisation of UK R&D , 2005 .
[4] Frank M. Bass,et al. A New Product Growth for Model Consumer Durables , 2004, Manag. Sci..
[5] James Bessen,et al. medium provided this notice is preserved. AN EMPIRICAL LOOK AT SOFTWARE PATENTS , 2004 .
[6] Jeng-Shyang Pan,et al. An Introduction to Watermarking Techniques , 2004 .
[7] Hernando de Soto,et al. The Mystery of Capital , 2004 .
[8] Julie E. Cohen,et al. Fair Use Infrastructure for Rights Management Systems , 2004 .
[9] Joseph P. Liu. The DMCA and the Regulation of Scientific Research , 2003 .
[10] Ross J. Anderson. Cryptography and competition policy: issues with 'trusted computing' , 2003, PODC '03.
[11] Alan M. Frieze,et al. A general model of web graphs , 2003, Random Struct. Algorithms.
[12] Barbara Fox,et al. Encouraging recognition of fair uses in DRM systems , 2003, CACM.
[13] John S. Erickson. Fair use, DRM, and trusted computing , 2003, CACM.
[14] H. Varian. BUYING, SHARING AND RENTING INFORMATION GOODS* , 2003 .
[15] E. Rogers,et al. Diffusion of innovations , 1964, Encyclopedia of Sport Management.
[16] Crispin Cowan,et al. Linux security modules: general security support for the linux kernel , 2002, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[17] Fred B. Schneider,et al. Enforceable security policies , 2000, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[18] Paul F. Uhlir,et al. Intellectual Property—When Is It the Best Incentive Mechanism for S&T Data and Information? , 2003 .
[19] K. Weber,et al. Kaufen oder Tauschen? Reziprozität und rationales Handeln bei Tauschvorgängen unter Freunden und in Internet-Tauschbörsen , 2003 .
[20] Artur-Axel Wandtke,et al. Gesetz zur Regelung des Urheberrechts in der Informationsgesellschaft , 2003 .
[21] Padraig Dixon,et al. The Economics of Intellectual Property: A Review to Identify Themes for Future Research , 2002 .
[22] Larry Korba,et al. Towards Meeting the Privacy Challenge: Adapting DRM , 2002, Digital Rights Management Workshop.
[23] Deirdre K. Mulligan,et al. Implementing Copyright Limitations in Rights Expression Languages , 2002, Digital Rights Management Workshop.
[24] Darko Kirovski,et al. Replacement Attack on Arbitrary Watermarking Systems , 2002, Digital Rights Management Workshop.
[25] Neil Weinstock Netanel,et al. The Commodification of Information , 2002 .
[26] Larry Korba,et al. Applying digital rights management systems to privacy rights management , 2002, Comput. Secur..
[27] Heung-Kyu Lee,et al. Robust Image Watermark Using Radon Transform and Bispectrum Invariants , 2002, Information Hiding.
[28] Wendy J. Gordon,et al. Market failure and intellectual property: a response to Professor Lunney , 2002 .
[29] Andrew Huang. The Trusted PC: Skin-Deep Security , 2002, Computer.
[30] Gordon E. Lyon. A Quick-Reference List of Organizations and Standards for Digital Rights Management | NIST , 2002 .
[31] Kar Yan Tam,et al. Understanding User Acceptance of Digital Libraries: What are the Roles of Interface Characteristics, Organizational Context, and Individual Differences? , 2002, Int. J. Hum. Comput. Stud..
[32] Lorin M. Hitt,et al. Measuring Switching Costs and the Determinants of Customer Retention in Internet-Enabled Businesses: A Study of the Online Brokerage Industry , 2002, Inf. Syst. Res..
[33] Rajiv Kohli,et al. Antecedents of B2C Channel Satisfaction and Preference: Validating e-Commerce Metrics , 2002, Inf. Syst. Res..
[34] Kiho Yoon,et al. The optimal level of copyright protection , 2002, Inf. Econ. Policy.
[35] Andrew Huang,et al. Keeping Secrets in Hardware: The Microsoft Xbox™ Case Study , 2002, CHES.
[36] L. Bygrave. Data Protection Law, Approaching Its Rationale, Logic and Limits , 2002 .
[37] Christian S. Collberg,et al. Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection , 2002, IEEE Trans. Software Eng..
[38] Peter S. Fader,et al. Fast-Track: Article Using Advance Purchase Orders to Forecast New Product Sales , 2002 .
[39] Paul England,et al. Authenticated Operation of Open Computing Devices , 2002, ACISP.
[40] Ralph Katz,et al. Shifting Innovation to Users via Toolkits , 2002, Manag. Sci..
[41] D. Kirovski,et al. A dual watermarking and fingerprinting system , 2002, Proceedings IEEE International Symposium on Information Theory,.
[42] Darko Kirovski,et al. The blind pattern matching attack on watermark systems , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[43] P. Samuelson,et al. The Law and Economics of Reverse Engineering , 2002 .
[44] M. Dekimpe,et al. The Market Valuation of Internet Channel Additions , 2002 .
[45] Kevin M. Murphy,et al. The Economics of Copyright ‘Fair Use’ in a Networked World , 2002 .
[46] E. Hippel,et al. Customers As Innovators: A New Way to Create Value , 2002 .
[47] Eric Allamanche,et al. MPEG-7 Scalable Robust Audio Fingerprinting , 2002 .
[48] Timothy Roscoe,et al. Mnemosyne: Peer-to-Peer Steganographic Storage , 2002, IPTPS.
[49] S H Strogatz,et al. Random graph models of social networks , 2002, Proceedings of the National Academy of Sciences of the United States of America.
[50] Silvio Micali,et al. Micropayments Revisited , 2002, CT-RSA.
[51] Robert A. Gehring. Software Development, Intellectual Property Rights, and IT Security , 2002 .
[52] Antonio Rodr ´ iguez. The European Software Piracy: An Empirical Application ⁄ , 2002 .
[53] Dan. Collusion-Secure Fingerprinting for Digital Data , 2002 .
[54] Lisa N. Takeyama. 1 Preliminary Piracy , Asymmetric Information , and Product Quality Revelation , 2002 .
[55] Y. Meinhardt,et al. Revisiting Strategy: Ein Ansatz zur Systematisierung von Geschäftsmodellen , 2002 .
[56] T. Hess,et al. Napster in der Videobranche? Erste Überlegungen zu Peer-to-Peer-Anwendungen für Videoinhalte , 2002 .
[57] Ethan M. Preston,et al. Computer Security Publications: Information Economics, Shifting Liability and the First Amendment , 2002 .
[58] Wendy J. Gordon,et al. Excuse and Justification in the Law of Fair Use: Commodification and Market Perspectives , 2002 .
[59] Joachim Henkel,et al. Open source software from commercial firms--tools, complements, and collective invention , 2002 .
[60] Margaret Jane Radin,et al. Online Standardization and the Integration of Text and Machine , 2002 .
[61] Jonathan Weinberg. Digital TV, Copy Control, and Public Policy , 2002 .
[62] Richard Stallman. Can you trust your computer , 2002 .
[63] Gregorio Robles,et al. Free/Libre and Open Source Software: Survey and Study - FLOSS FINAL REPORT , 2002 .
[64] Molly Shaffer Van Houweling. Cultivating Open Information Platforms: A Land Trust Model , 2002, J. Telecommun. High Technol. Law.
[65] John S. Erickson,et al. OpenDRM: A Standards Framework for Digital Rights Expression, Messaging and Enforcement , 2002 .
[66] A. Pfitzmann,et al. Anforderungen an die gesetzliche Regulierung zum Schutz digitaler Inhalte unter Berücksichtigung der Effektivität technischer Schutzmechanismen , 2002 .
[67] Philip J. Weiser. Law and Information Platforms , 2002, J. Telecommun. High Technol. Law.
[68] Michel Dagenais,et al. A Distributed Security Infrastructure for Carrier Class Linux Clusters , 2002 .
[69] Ross J. Anderson,et al. Security in open versus closed systems - the dance of Boltzmann , 2002 .
[70] David R. Safford. Clarifying Misinformation on TCPA , 2002 .
[71] Janice M. Mueller,et al. No 'Dilettante Affair': Rethinking the Experimental Use Exception to Patent Infringement for Biomedical Research Tools , 2009 .
[72] K. Hui,et al. Piracy and the Legitimate Demand for Recorded Music , 2002 .
[73] Francesco Parisi,et al. Fair Use and Copyright Protection: A Price Theory Explanation , 2002 .
[74] Tomas Sander. Golden Times for Digital Rights Management? , 2001, Financial Cryptography.
[75] Angelos D. Keromytis,et al. Offline Micropayments without Trusted Hardware , 2002, Financial Cryptography.
[76] Helmut Neuschmied,et al. Content-based identification of audio titles on the Internet , 2001, Proceedings First International Conference on WEB Delivering of Music. WEDELMUSIC 2001.
[77] Stephen Mooney,et al. Digital Rights Management: Business and Technology , 2001 .
[78] Joan Feigenbaum,et al. Privacy Engineering for Digital Rights Management Systems , 2001, Digital Rights Management Workshop.
[79] Radek Vingralek,et al. How to Manage Persistent State in DRM Systems , 2001, Digital Rights Management Workshop.
[80] Dawn Xiaodong Song,et al. A Cryptanalysis of the High-Bandwidth Digital Content Protection System , 2001, Digital Rights Management Workshop.
[81] Jürgen Herre,et al. Advanced Audio Identification Using MPEG-7 Content Description , 2001 .
[82] Fan Chung Graham,et al. Random evolution in massive graphs , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[83] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.
[84] Phil Weiser. Networks Unplugged: Towards A Model of Compatibility Regulation Between Information Platforms , 2001, ArXiv.
[85] William H. Mischo,et al. Linking to the Appropriate Copy: Report of a DOI-Based Prototype , 2001, D Lib Mag..
[86] Min Wu,et al. Reading Between the Lines: Lessons from the SDMI Challenge , 2001, USENIX Security Symposium.
[87] Jacob Goldenberg,et al. Talk of the Network: A Complex Systems Look at the Underlying Process of Word-of-Mouth , 2001 .
[88] Nazim Fatès,et al. Public automated web-based evaluation service for watermarking schemes: StirMark benchmark , 2001, IS&T/SPIE Electronic Imaging.
[89] Jürgen Herre,et al. MPEG-7 and MPEG-7 audio: An overview , 2001 .
[90] David R. Karger,et al. Building peer-to-peer systems with chord, a distributed lookup service , 2001, Proceedings Eighth Workshop on Hot Topics in Operating Systems.
[91] Hal R. Varian,et al. Circulating Libraries and Video Rental Stores , 2001, First Monday.
[92] Jürgen Herre,et al. AudioID: Towards Content-Based Identification of Audio Material , 2001 .
[93] Frank Kurth,et al. Full-Text Indexing of Very Large Audio Data Bases , 2001 .
[94] Darko Kirovski,et al. Robust Covert Communication over a Public Audio Channel Using Spread Spectrum , 2001, Information Hiding.
[95] John S. Erickson. Information Objects and Rights Management: A Mediation-based Approach to DRM Interoperability , 2001, D Lib Mag..
[96] Access Control and Innovation under the Emerging EU Electronic Commerce Framework , 2001 .
[97] Håkan J. Holm,et al. The Computer Generation's Willingness to Pay for Originals when Pirates are Present – A CV study , 2001 .
[98] Pm Schwartz,et al. Beyond Lessig's Code for Internet Privacy: Cyberspace Filters, Privacy Control and Fair Information Practices , 2001 .
[99] Yahiko Kambayashi,et al. Representation of reuse mechanisms for digital work with multiple right-holders , 2001, Proceedings 2001 Symposium on Applications and the Internet Workshops (Cat. No.01PR0945).
[100] Robert Mcgarvey. Pay-per-view's payback: cashing in on content , 2001 .
[101] T. Dreier,et al. Das Verhältnis des Urheberrechts zum Vertragsrecht - Grenzen des Vertragsrechts durch Intellectual Property Law , 2001 .
[102] John C. Knight,et al. A security architecture for survivability mechanisms , 2001 .
[103] P. Weiser. Internet Governance, Standard Setting, and Self-Regulation , 2001 .
[104] Ross J. Anderson. Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .
[105] Rick Harbaugh,et al. Does Copyright Enforcement Encourage Piracy? , 2001 .
[106] Eric R. Emch. Price Discrimination via Proprietary Aftermarkets , 2000 .
[107] Mark Bartel,et al. Xml-Signature Syntax and Processing , 2000 .
[108] Julie E. Cohen. Copyright and the Perfect Curve , 2000 .
[109] H. Raghav Rao,et al. On risk, convenience, and Internet shopping behavior , 2000, CACM.
[110] Roger Silverstone,et al. E-Conomics: Strategies for the Digital Marketplace , 2000 .
[111] Jaap Gordijn,et al. Selling Bits: A Matter of Creating Consumer Value , 2000, EC-Web.
[112] Fabien A. P. Petitcolas,et al. Watermarking schemes evaluation , 2000, IEEE Signal Process. Mag..
[113] Christian Neubauer,et al. Advanced Watermarking and Its Applications , 2000 .
[114] Nicola Guarino,et al. Identity, Unity, and Individuality: Towards a Formal Toolkit for Ontological Analysis , 2000, ECAI.
[115] Julie E. Cohen,et al. Fair Use Infrastructure for Copyright Management Systems , 2000 .
[116] G. Wornell,et al. Quantization index modulation: a class of provably good methods for digital watermarking and information embedding , 2000, 2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060).
[117] Masayuki Kumazawa,et al. Relationship among copyright holders for use and reuse of digital contents , 2000, DL '00.
[118] Jeffrey K. MacKie-Mason,et al. Exercising Market Power in Proprietary Aftermarkets , 2000 .
[119] Jean-Henry Morin,et al. Agent-based commercial dissemination of electronic information , 2000, Comput. Networks.
[120] Thierry Pun,et al. Generalized watermarking attack based on watermark estimation and perceptual remodulation , 2000, Electronic Imaging.
[121] Sviatoslav Voloshynovskiy,et al. Watermark copy attack , 2000, Electronic Imaging.
[122] J. Ginsburg. From Having Copies to Experiencing Works: The Development of an Access Right in U.S. Copyright Law , 2000 .
[123] Eric A. von Hippel,et al. How Open Source Software Works: 'Free' User-to-User Assistance? , 2000 .
[124] Premkumar T. Devanbu,et al. Software engineering for security: a roadmap , 2000, ICSE '00.
[125] Hugo Krawczyk,et al. Design, implementation, and deployment of the iKP secure electronic payment system , 2000, IEEE Journal on Selected Areas in Communications.
[126] E. Fehr,et al. Fairness and Retaliation: The Economics of Reciprocity , 2000, SSRN Electronic Journal.
[127] Ahmad-Reza Sadeghi,et al. Self-Escrowed Cash against User Blackmailing , 2000, Financial Cryptography.
[128] Els Van Herreweghen. Non-repudiation in SET: Open Issues , 2000, Financial Cryptography.
[129] R. Picard. Changing business models of online content services: Their implications for multimedia and other content producers , 2000 .
[130] P. Loo,et al. Digital watermarking using complex wavelets , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[131] P. Hugenholtz. Why the Copyright Directive is Unimportant, and Possibly Invalid , 2000 .
[132] K. J. Koelman,et al. The Protection of Technological Measures , 2000 .
[133] Birgit Pfitzmann,et al. Secure and Anonymous Electronic Commerce: Providing Legal Certainty in Open Digital Systems Without , 2000 .
[134] Lee Tien. Publishing Software as a Speech Act , 2000 .
[135] Rainer Alt,et al. Electronic Commerce and Reduced Transaction Costs Firms ’ Migration into Highly Interconnected Electronic Markets , 2000 .
[136] Vinton G. Cerf,et al. What Is the Internet (and What Makes it Work) , 1999 .
[137] M. Newman,et al. Small Worlds: The Structure of Social Networks , 1999 .
[138] Markus Jakobsson,et al. Electronic Payments: Where Do We Go from Here? , 1999, CQRE.
[139] Andrew W. Appel,et al. Proof-carrying authentication , 1999, CCS '99.
[140] Amnon Ta-Shma,et al. On Anonymous Electronic Cash and Crime , 1999, ISW.
[141] Wendy J. Gordon,et al. Intellectual Property as Price Discrimination: Implications for Contract , 1999 .
[142] Albert,et al. Emergence of scaling in random networks , 1999, Science.
[143] Bruce Schneier,et al. The Street Performer Protocol and Digital Copyrights , 1999, First Monday.
[144] Jean-Luc Dugelay,et al. Fractal transform based large digital watermark embedding and robust full blind extraction , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.
[145] Oz Shy,et al. A strategic approach to software protection , 1999 .
[146] John J. Sviokla,et al. Exploiting the virtual value chain , 1999 .
[147] Tim O'Reilly,et al. Lessons from open-source software development , 1999, CACM.
[148] Daniel J. Gervais. Electronic Rights Management and Digital Identifier Systems , 1999 .
[149] J. Hagel,et al. Unbundling the corporation. , 1999, Harvard business review.
[150] Mark J. Safferstone. Information Rules: A Strategic Guide to the Network Economy , 1999 .
[151] Arnold Picot,et al. Die Internet-ökonomie: Stratagien für die Digitale Wirtschaft , 1999 .
[152] Christopher Allen,et al. The TLS Protocol Version 1.0 , 1999, RFC.
[153] Kevin Crowston,et al. Real Estate War in Cyberspace: An Emerging Electronic Market? , 1999, Electron. Mark..
[154] Yannis Bakos,et al. Shared Information Goods , 1999 .
[155] Frank Rose. The Economics, Concept, and Design of Information Intermediaries , 1998 .
[156] Yiannis Tsiounis,et al. Fair Off-Line e-cash Made Easy , 1998, ASIACRYPT.
[157] Eric S. Raymond,et al. Homesteading the Noosphere , 1998, First Monday.
[158] Julie E. Cohen. Lochner in Cyberspace: The New Economic Orthodoxy of 'Rights Management' , 1998 .
[159] Michael G. Strintzis,et al. Robust image watermarking in the subband or discrete cosine transform domain , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).
[160] Reginald L. Lagendijk,et al. Removing spatial spread spectrum watermarks by non-linear filtering , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).
[161] Ennio Ottaviani,et al. Non-invertible statistical wavelet watermarking , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).
[162] Michael Stumm,et al. NetCents: A Lightweight Protocol for Secure Micropayments , 1998, USENIX Workshop on Electronic Commerce.
[163] B. Schneier,et al. Electronic commerce and the street performer protocol , 1998 .
[164] Duncan J. Watts,et al. Collective dynamics of ‘small-world’ networks , 1998, Nature.
[165] Yiannis Tsiounis,et al. Easy Come - Easy Go Divisible Cash , 1998, EUROCRYPT.
[166] Christian S. Collberg,et al. Breaking abstractions and unstructuring data structures , 1998, Proceedings of the 1998 International Conference on Computer Languages (Cat. No.98CB36225).
[167] Deepa Kundur,et al. Digital watermarking using multiresolution wavelet decomposition , 1998, Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '98 (Cat. No.98CH36181).
[168] Mauro Barni,et al. A DCT-domain system for robust image watermarking , 1998, Signal Process..
[169] Ioannis Pitas,et al. Robust image watermarking in the spatial domain , 1998, Signal Process..
[170] Markus G. Kuhn,et al. Attacks on Copyright Marking Systems , 1998, Information Hiding.
[171] Jean-Paul M. G. Linnartz,et al. Analysis of the Sensitivity Attack against Electronic Watermarks in Images , 1998, Information Hiding.
[172] Jerry Kang. Information Privacy in Cyberspace Transactions , 1998 .
[173] Rudolf L. van Renesse,et al. Verifying versus falsifying banknotes , 1998 .
[174] Larry Downes,et al. Unleashing the Killer App: Digital Strategies for Market Dominance , 1998 .
[175] Rafail Ostrovsky,et al. Micropayments via Efficient Coin-Flipping , 1998, Financial Cryptography.
[176] Jacques Traoré,et al. An Efficient Fair Off-Line Electronic Cash System with Extensions to Checks and Wallets with Observers , 1998, Financial Cryptography.
[177] Christine Jolls,et al. A Behavioral Approach to Law and Economics , 1998 .
[178] Ricarda Weber. Chablis - Market Analysis of Digital Payment Systems , 1998 .
[179] A. Kroon. Protection of Copyright Management Information , 1998 .
[180] M. Heller,et al. Can Patents Deter Innovation , 1998 .
[181] D. Bernhardt,et al. Pirated for Profit , 1998 .
[182] Lee A. Bygrave,et al. Privacy, Data Protection and Copyright: Their Interaction in the Context of Electronic Copyright Management Systems , 1998 .
[183] Kevin F. Kelly. New Rules for the New Economy , 1998 .
[184] Is electronic cash possible , 1998 .
[185] Yannis Bakos,et al. Bundling Information Goods: Pricing, Profits and Efficiency , 1998 .
[186] Mark A. Lemley,et al. Legal Implications of Network Economic Effects , 1998 .
[187] Guillaume Poupard,et al. Efficient scalable fair cash with off-line extortion prevention , 1997, ICICS.
[188] Lisa N. Takeyama. The Intertemporal Consequences of Unauthorized Reproduction of Intellectual Property1 , 1997, The Journal of Law and Economics.
[189] Amir Herzberg,et al. MiniPay: Charging per Plick on the Web , 1997, Comput. Networks.
[190] Philippe A. Janson,et al. The State of the Art in Electronic Payment Systems , 1997, Computer.
[191] A. Picot,et al. Information, Organization and Management: Expanding Markets and Corporate Boundaries , 1997 .
[192] Cécile de Terwangne,et al. Data protection and online networks , 1997, Comput. Law Secur. Rev..
[193] Peter C. Fishburn,et al. Fixed fee versus unit pricing for information goods: competition, equilibria, and price wars , 1997, First Monday.
[194] Wenjun Zeng,et al. Digital image watermarking using visual models , 1997, Electronic Imaging.
[195] Ingemar J. Cox,et al. Review of watermarking and the importance of perceptual modeling , 1997, Electronic Imaging.
[196] William A. Arbaugh,et al. A secure and reliable bootstrap architecture , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[197] Robert H. Deng,et al. Breaking Public Key Cryptosystems on Tamper Resistant Devices in the Presence of Transient Faults , 1997, Security Protocols Workshop.
[198] Hsing K. Cheng,et al. To Purchase or to Pirate Software: An Empirical Study , 1997, J. Manag. Inf. Syst..
[199] Ronald L. Rivest,et al. Electronic Lottery Tickets as Micropayments , 1997, Financial Cryptography.
[200] Stanislaw Jarecki,et al. An Efficient Micropayment System Based on Probabilistic Polling , 1997, Financial Cryptography.
[201] Yiannis Tsiounis,et al. Anonymity Control in E-Cash Systems , 1997, Financial Cryptography.
[202] Markus Jakobsson,et al. Applying Anti-Trust Policies to Increase Trust in a Versatile E-Money System , 1997, Financial Cryptography.
[203] Reginald L. Lagendijk,et al. Robust labeling methods for copy protection of images , 1997, Electronic Imaging.
[204] P. Putland,et al. Electronic payment systems , 1997 .
[205] Julie E. Cohen. A Right to Read Anonymously: A Closer Look at , 1997 .
[206] T. Bell. Fair Use Vs. Fared Use: The Impact of Automated Rights Management on Copyright's Fair Use Doctrine , 1996 .
[207] Alan O. Freier,et al. The SSL Protocol Version 3.0 , 1996 .
[208] Markus G. Kuhn,et al. Tamper resistance: a cautionary note , 1996 .
[209] E. Gabber,et al. Agora: a minimal distributed protocol for electronic commerce , 1996 .
[210] Ueli Maurer,et al. Digital Payment Systems With Passive Anonymity-Revoking Trustees , 1996, J. Comput. Secur..
[211] Francis M. Boland,et al. Phase watermarking of digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[212] Bin Zhu,et al. Robust data hiding for images , 1996, 1996 IEEE Digital Signal Processing Workshop Proceedings.
[213] Douglas Keislar,et al. Content-Based Classification, Search, and Retrieval of Audio , 1996, IEEE Multim..
[214] Ahmed H. Tewfik,et al. Digital watermarks for audio signals , 1996, 1996 8th European Signal Processing Conference (EUSIPCO 1996).
[215] Martin Fojt,et al. Doing business on the information superhighway , 1996, Internet Res..
[216] Ingemar J. Cox,et al. A Secure, Robust Watermark for Multimedia , 1996, Information Hiding.
[217] C. Dennis Allen,et al. User customization of a word processor , 1996, CHI.
[218] Tatsuaki Okamoto,et al. Practical Escrow Cash System , 1996, Security Protocols Workshop.
[219] Adi Shamir,et al. PayWord and MicroMint: Two Simple Micropayment Schemes , 1996, Security Protocols Workshop.
[220] Donald V. Moser,et al. Fairness in Ultimatum Games with Asymmetric Information and Asymmetric Payoffs , 1996 .
[221] Torben P. Pedersen. Electronic Payments of Small Amounts , 1995, Security Protocols Workshop.
[222] Andrew Burke,et al. How effective are international copyright conventions in the music industry? , 1996 .
[223] Ralf Hauser,et al. Micro-Payments based on iKP , 1996 .
[224] Martín Abadi,et al. The Millicent Protocol for Inexpensive Electronic Commerce , 1995, World Wide Web J..
[225] Jan Camenisch,et al. An efficient fair payment system , 1996, CCS '96.
[226] Markus Jakobsson,et al. Revokable and versatile electronic money (extended abstract) , 1996, CCS '96.
[227] M. Yung,et al. \indirect Discourse Proofs": Achieving Eecient Fair Oo-line E-cash , 1996 .
[228] B. Pfitzmann,et al. Properties of Payment Systems - General Definition Sketch and Classification , 1996 .
[229] Tatsuaki Okamoto,et al. An Efficient Divisible Electronic Cash Scheme , 1995, CRYPTO.
[230] G. J. Leigh. A fixation with fixation. , 1995, Science.
[231] Marvin A. Sirbu,et al. NetBill: an Internet commerce system optimized for network-delivered services , 1995, IEEE Wirel. Commun..
[232] B. Clifford Neuman,et al. Requirements for network payment: the NetCheque perspective , 1995, Digest of Papers. COMPCON'95. Technologies for the Information Superhighway.
[233] Ernest F. Brickell,et al. Trustee-based tracing extensions to anonymous cash and the making of anonymous change , 1995, SODA '95.
[234] Vijay Mahajan,et al. Software Piracy: Estimation of Lost Sales and the Impact on Software Diffusion , 1995 .
[235] R. Wigand,et al. Electronic Markets and Virtual Value Chains on the Information Superhighway , 1995 .
[236] Jian Zhao,et al. Embedding Robust Labels into Images for Copyright Protection , 1995, KnowRight.
[237] G. Davies,et al. A history of money : from ancient times to the present day , 1995 .
[238] C. F. Osborne,et al. A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.
[239] Sanjoy Paul,et al. Anonymous credit cards , 1994, CCS '94.
[240] Lisa N. Takeyama. The Welfare Implications of Unauthorized Reproduction of Intellectual Property in the Presence of Demand Network Externalities , 1994 .
[241] Stephen E. Margolis,et al. Network externality : an uncommon tragedy , 1994 .
[242] C. Shapiro,et al. Systems Competition and Network Effects , 1994 .
[243] L. Taylor. Telecommunications Demand in Theory and Practice , 1994 .
[244] B. Clifford Neuman,et al. NetCash: a design for practical electronic currency on the Internet , 1993, CCS '93.
[245] Georg Franck,et al. Ökonomie der Aufmerksamkeit , 1993 .
[246] Stefan A. Brands,et al. Untraceable Off-line Cash in Wallets with Observers (Extended Abstract) , 1993, CRYPTO.
[247] Stefan A. Brands,et al. An Efficient Off-line Electronic Cash System Based On The Representation Problem. , 1993 .
[248] David Naccache,et al. On blind signatures and perfect crimes , 1992, Comput. Secur..
[249] David Chaum,et al. Transferred Cash Grows in Size , 1992, EUROCRYPT.
[250] Tatsuaki Okamoto,et al. Universal Electronic Cash , 1991, CRYPTO.
[251] Wendy E. Mackay,et al. Triggers and barriers to customizing software , 1991, CHI.
[252] K. R. Conner,et al. Software piracy: an analysis of protection strategies , 1991 .
[253] K. Tanaka,et al. Embedding secret information into a dithered multi-level image , 1990, IEEE Conference on Military Communications.
[254] Michael E. Porter,et al. The Competitive Advantage of Nations. , 1990 .
[255] R. Nelson,et al. On the Complex Economics of Patent Scope , 1990 .
[256] Daniel A. Levinthal,et al. ABSORPTIVE CAPACITY: A NEW PERSPECTIVE ON LEARNING AND INNOVATION , 1990 .
[257] Birgit Pfitzmann,et al. Rechtssicherheit trotz Anonymität in offenen digitalen Systemen , 1990 .
[258] Vijay Mahajan,et al. New Product Diffusion Models in Marketing: A Review and Directions for Research: , 1990 .
[259] R. Mori,et al. Superdistribution : the concept and the architecture , 1990 .
[260] S. Besen,et al. Private Copying, Appropriability, and Optimal Copying Royalties , 1989, The Journal of Law and Economics.
[261] Kazuo Ohta,et al. Disposable Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash , 1989, CRYPTO.
[262] R. Posner,et al. An Economic Analysis of Copyright Law , 1989, The Journal of Legal Studies.
[263] Amos Fiat,et al. Untraceable Electronic Cash , 1990, CRYPTO.
[264] Jeffrey I. Schiller,et al. An Authentication Service for Open Network Systems. In , 1998 .
[265] JoAnne Yates,et al. Electronic markets and electronic hierarchies , 1987, CACM.
[266] S. Besen. Private copying, reproduction costs, and the supply of intellectual property , 1986 .
[267] R. Wittmann,et al. Deutsche Urheber- und Verlagsrechtsgeschichte zwischen 1450 und 1850 , 1986 .
[268] S. Liebowitz. Copying and Indirect Appropriability: Photocopying of Journals , 1985, Journal of Political Economy.
[269] William R. Johnson,et al. The Economics of Copying , 1985, Journal of Political Economy.
[270] K. H. Barratt. Digital Coding of Waveforms , 1985 .
[271] C. Shapiro,et al. Network Externalities, Competition, and Compatibility , 1985 .
[272] V. Mahajan,et al. Introduction Strategy for New Products with Positive and Negative Word-of-Mouth , 1984 .
[273] Michael Waldman,et al. The Effects of Increased Copyright Protection: An Analytic Approach , 1984, Journal of Political Economy.
[274] R. Pinto. La liberté d'information et d'opinion en droit international , 1984 .
[275] Manuel Blum,et al. Coin flipping by telephone a protocol for solving impossible problems , 1983, SIGA.
[276] L. B. Milstein,et al. Theory of Spread-Spectrum Communications - A Tutorial , 1982, IEEE Transactions on Communications.
[277] L. G. Tornatzky,et al. Innovation characteristics and innovation adoption-implementation: A meta-analysis of findings , 1982, IEEE Transactions on Engineering Management.
[278] S. Bok. Secrets: On the Ethics of Concealment and Revelation , 1982 .
[279] O. Williamson. The Economics of Organization: The Transaction Cost Approach , 1981, American Journal of Sociology.
[280] O. Williamson. The Modern Corporation: Origins, Evolution, Attributes , 1981 .
[281] Mancur Olson,et al. Die Logik des kollektiven Handelns. Kollektivgüter und die Theorie der Gruppen , 1979 .
[282] J. Ordover,et al. On the optimal provision of journals qua sometimes shared goods. , 1978, The American economic review.
[283] O. Williamson. Markets and hierarchies, analysis and antitrust implications : a study in the economics of internal organization , 1975 .
[284] G. Calabresi,et al. Property Rules, Liability Rules, and Inalienability: One View of the Cathedral , 1972 .
[285] Yoram Barzel,et al. Optimal Timing of Innovations , 1968 .
[286] K. Arrow. Economic Welfare and the Allocation of Resources for Invention , 1962 .
[287] R. Coase. The Nature of the Firm , 1937 .
[288] Rudolph Sohm. Institutionen : Geschichte und System des römischen Privatrechts , 1908 .