How Viable Is Digital Rights Management?
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Hwang, Seong Oun | - |
dc.date.accessioned | 2022-01-03T05:43:47Z | - |
dc.date.available | 2022-01-03T05:43:47Z | - |
dc.date.created | 2021-12-28 | - |
dc.date.issued | 2009-04 | - |
dc.identifier.issn | 0018-9162 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hongik/handle/2020.sw.hongik/21887 | - |
dc.description.abstract | Technologies that aim to protect digital content have fallen short of their mission. The computing community must find ways to make protection schemes interoperable and adopt a use model that lifts restrictions on paid-for protected content. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | IEEE COMPUTER SOC | - |
dc.title | How Viable Is Digital Rights Management? | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Hwang, Seong Oun | - |
dc.identifier.doi | 10.1109/MC.2009.120 | - |
dc.identifier.scopusid | 2-s2.0-67649370954 | - |
dc.identifier.wosid | 000265372500013 | - |
dc.identifier.bibliographicCitation | COMPUTER, v.42, no.4, pp.28 - + | - |
dc.relation.isPartOf | COMPUTER | - |
dc.citation.title | COMPUTER | - |
dc.citation.volume | 42 | - |
dc.citation.number | 4 | - |
dc.citation.startPage | 28 | - |
dc.citation.endPage | + | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Hardware & Architecture | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Software Engineering | - |
dc.subject.keywordAuthor | Communities | - |
dc.subject.keywordAuthor | Computational modeling | - |
dc.subject.keywordAuthor | Cryptography | - |
dc.subject.keywordAuthor | Data mining | - |
dc.subject.keywordAuthor | Internet Protocol | - |
dc.subject.keywordAuthor | IPSec | - |
dc.subject.keywordAuthor | IPv4 | - |
dc.subject.keywordAuthor | IPv6 | - |
dc.subject.keywordAuthor | Network attacks | - |
dc.subject.keywordAuthor | Network security | - |
dc.subject.keywordAuthor | Probability density function | - |
dc.subject.keywordAuthor | Security | - |
dc.subject.keywordAuthor | Transform coding | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
94, Wausan-ro, Mapo-gu, Seoul, 04066, Korea02-320-1314
COPYRIGHT 2020 HONGIK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.