Digital rights management

Results: 2605



#Item
91The Emmet O’Neal Library

The Emmet O’Neal Library

Add to Reading List

Source URL: www.eolib.org

Language: English - Date: 2009-10-09 14:19:02
92The Teaching Privacy Curriculum Serge Egelman1 , Gerald Friedland1 , Julia Bernd1 , Dan Garcia2 , and Blanca Gordo1 1 1.

The Teaching Privacy Curriculum Serge Egelman1 , Gerald Friedland1 , Julia Bernd1 , Dan Garcia2 , and Blanca Gordo1 1 1.

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2015-07-17 22:36:03
93The Digital Dilemma: Intellectual Property in the Information Age http://www.nap.edu/catalog/9601.html APPENDIX G The Digital Millennium Copyright Act of 1998 and Circumvention of

The Digital Dilemma: Intellectual Property in the Information Age http://www.nap.edu/catalog/9601.html APPENDIX G The Digital Millennium Copyright Act of 1998 and Circumvention of

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2011-09-07 17:08:21
94This article was downloaded by: [Harvard College] On: 27 April 2012, At: 06:09 Publisher: Routledge Informa Ltd Registered in England and Wales Registered Number: Registered office: Mortimer House, 37-41 Mortimer

This article was downloaded by: [Harvard College] On: 27 April 2012, At: 06:09 Publisher: Routledge Informa Ltd Registered in England and Wales Registered Number: Registered office: Mortimer House, 37-41 Mortimer

Add to Reading List

Source URL: katiedavisresearch.com

Language: English - Date: 2016-02-26 23:33:38
95Privacy / Data security / Copyright law / Cryptography / Identity management / P3P / Digital rights management / Personally identifiable information / Internet privacy / Digital Copyright / Digital Millennium Copyright Act / Information security

Towards Realistic Assumptions, Models, and Goals for Security Research (White Paper for NSF Workshop) Joan Feigenbaum

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2002-05-22 10:45:19
96Work Package 5  Secure Renewability of Compromised IPMP Tools Beilu Shao EPFL

Work Package 5 Secure Renewability of Compromised IPMP Tools Beilu Shao EPFL

Add to Reading List

Source URL: enthrone.itec.uni-klu.ac.at

Language: English - Date: 2008-05-01 07:32:13
97Design and Implementation of Privacy-Preserving Surveillance Aaron Segal Yale University May 11, 2016

Design and Implementation of Privacy-Preserving Surveillance Aaron Segal Yale University May 11, 2016

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2016-05-21 14:02:03
98Crittenden County Public Library  1 GETTING STARTED – THE TECHNICAL STUFF How Do I Use Freading Ebooks?

Crittenden County Public Library 1 GETTING STARTED – THE TECHNICAL STUFF How Do I Use Freading Ebooks?

Add to Reading List

Source URL: crittendenlibrary.org

Language: English - Date: 2015-03-10 17:39:38
99Microsoft WordPFGWG Draft Mission Statement.doc

Microsoft WordPFGWG Draft Mission Statement.doc

Add to Reading List

Source URL: dcia.info

Language: English - Date: 2015-12-26 10:50:21
100Privacy Lead Objectives e-Safety Committee Objective •	 •	 •

Privacy Lead Objectives e-Safety Committee Objective • • •

Add to Reading List

Source URL: ikeepsafe.org

Language: English - Date: 2016-01-28 19:32:04