Jeffrey B. Lotspiech

According to our database1, Jeffrey B. Lotspiech authored at least 37 papers between 1988 and 2011.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2011
Piracy Protection for Streaming Content in Home Networks.
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011

Efficient traitor tracing for clone attack in content protection.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

2010
Defending against the pirate evolution attack.
Int. J. Appl. Cryptogr., 2010

2009
Broadcast Encryption for Differently Privileged.
Proceedings of the Emerging Challenges for Security, 2009

Practical tracing traitors.
Proceedings of the Media Forensics and Security I, 2009

Defending against the Pirate Evolution Attack.
Proceedings of the Information Security Practice and Experience, 2009

Broadcast encryption versus public key cryptography in content protection systems.
Proceedings of the 9th ACM Workshop on Digital Rights Management, 2009

Unifying Broadcast Encryption and Traitor Tracing for Content Protection.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
Efficient Coalition Detection in Traitor Tracing.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

Adaptive traitor tracing for large anonymous attack.
Proceedings of the 8th ACM Workshop on Digital Rights Management, 2008

2007
Renewable Traitor Tracing: A Trace-Revoke-Trace System For Anonymous Attack.
Proceedings of the Computer Security, 2007

A Signature-Like Primitive for Broadcast-Encryption-Based Systems.
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007

2006
Traitor Tracing for Subscription-Based Systems.
Proceedings of the SECRYPT 2006, 2006

Practical Forensic Analysis in Advanced Access Content System.
Proceedings of the Information Security Practice and Experience, 2006

Hybrid Traitor Tracing.
Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, 2006

2005
Towards Better Software Tamper Resistance.
Proceedings of the Information Security, 8th International Conference, 2005

Attacks and Forensic Analysis for Multimedia Content Protection.
Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, 2005

Flexible Traitor Tracing for Anonymous Attacks.
Proceedings of the Communications and Multimedia Security, 2005

2004
xCP: peer-to-peer content protection.
IEEE Signal Process. Mag., 2004

Anonymous Trust: Digital Rights Management Using Broadcast Encryption.
Proc. IEEE, 2004

Traitor tracing for prerecorded and recordable media.
Proceedings of the 2004 ACM Workshop on Digital Rights Management 2004, Washington, 2004

2003
Proactive Software Tampering Detection.
Proceedings of the Information Security, 6th International Conference, 2003

Forensic Analysis for Tamper Resistant Software.
Proceedings of the 14th International Symposium on Software Reliability Engineering (ISSRE 2003), 2003

2002
Revocation and Tracing Schemes for Stateless Receivers
Electron. Colloquium Comput. Complex., 2002

Broadcast Encryption's Bright Future.
Computer, 2002

1998
Safeguarding Digital Library Contents and Users: Storing, Sending, Showing, and Honoring Usage Terms and Conditions.
D Lib Mag., 1998

Security for the Digital Library - Protecting Documents Rather than Channels.
Proceedings of the Ninth International Workshop on Database and Expert Systems Applications, 1998

1997
Safeguarding Digital Library Contents and Users: Digital Watermarking.
D Lib Mag., 1997

Safeguarding Digital Library Contents and Users: Protecting Documents Rather Than Channels.
D Lib Mag., 1997

Safeguarding Digital Library Contents and Users: Assuring Convenient Security and Data Quality.
D Lib Mag., 1997

Cryptographic Containers and the Digital Library.
Proceedings of the Verläßliche IT-Systeme - Zwischen Key Escrow und elektronischem Geld, 1997

1996
Digital Signets: Self-Enforcing Protection of Digital Information (Preliminary Version).
Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, 1996

A Digital Library System for Periodicals Distribution.
Proceedings of the Third Forum on Research and Technology Advances in Digital Library, 1996

1995

1992
On Finding Non-Intersecting Straightline Connections of Grid Points to the Boundary.
J. Algorithms, 1992

1991
A Fast Algorithm for Connecting Grid Points to the Boundary with Nonintersecting Straight Lines.
Proceedings of the Second Annual ACM/SIGACT-SIAM Symposium on Discrete Algorithms, 1991

1988
The escher document imaging model.
Proceedings of the ACM conference on Document processing systems, 1988


  Loading...