专题:Digital Rights Management and Security

This cluster of papers focuses on the architectures, technologies, and challenges related to Digital Rights Management (DRM). It covers topics such as interoperability, privacy, security architecture, fair use, rights expression languages, mobile DRM, cloud computing, smart cards, and copyright protection.
最新文献
Data Rights Confirmation and Digital Firms’ Innovation: Evidence from China

article Full Text OpenAlex

Token-based payment systems

book-chapter Full Text OpenAlex

Fair blockchain-based delivery of digital assets

article Full Text OpenAlex

The Paradox of Fair Use – A Giant on a Seesaw: Restoring the Balance in Copyright and Media-Specific Issues

article Full Text OpenAlex

Harvard Release and Research Funding 1.0

article Full Text OpenAlex

Compliance-by-Design Micro-Licensing for AI-Generated Content in Social Commerce Using C2PA Content Credentials and W3C ODRL Policies

article Full Text OpenAlex

UniqueNFT: Uniqueness Protection of Digital Assets in Decentralized Web

article Full Text OpenAlex

Aegis: A Framework for Secure and Upgradeable Digital Token Contracts Using Advanced Smart Contract Patterns

preprint Full Text OpenAlex

RFC 0001 — The Universal Sports Graph: A Protocol for Rights, Reach, and Real-Time Access

article Full Text OpenAlex

Construction of Fair Use Rules for Copyright in Text and Data Mining in the Era of Generative Artificial Intelligence

article Full Text OpenAlex

近5年高被引文献
EdgeShard: Efficient LLM Inference via Collaborative Edge Computing

article Full Text OpenAlex 103 FWCI83.0179

Secure ECC-Based Three-Factor Mutual Authentication Protocol for Telecare Medical Information System

article Full Text OpenAlex 103 FWCI14.0936

Fine-Tuning Large Language Models for Specialized Use Cases

review Full Text OpenAlex 85 FWCI67.9495

Screen-Shooting Resistant Watermarking With Grayscale Deviation Simulation

article Full Text OpenAlex 77 FWCI19.7091

Status report on the final round of the NIST lightweight cryptography standardization process

report Full Text OpenAlex 67 FWCI0

Exploiting Programmatic Behavior of LLMs: Dual-Use Through Standard Security Attacks

article Full Text OpenAlex 65 FWCI48.7103

Triple Entry Accounting

article Full Text OpenAlex 64 FWCI16.9623

Detect Defects of Solidity Smart Contract Based on the Knowledge Graph

article Full Text OpenAlex 49 FWCI22.4057

How platforms govern users’ copyright-protected content: Exploring the power of private ordering and its implications

article Full Text OpenAlex 47 FWCI10.4696

FedCRMW: Federated model ownership verification with compression-resistant model watermarking

article Full Text OpenAlex 46 FWCI16.5365