Table of contents

  1. Front Matter
  2. Assurance and Authentication Issues

    1. Mahadevan Gomathisankaran, Akhilesh Tyagi
      Pages 13-31
  3. Legal and Related Issues

  4. Expressing Rights and Management

    1. Milan Petković, R. Paul Koster
      Pages 75-89
    2. K. Bhoopalam, K. Maly, R. Mukkamala, M. Zubair, D. Agrawal, D. Kaminsky
      Pages 102-112
  5. Watermarking

    1. Yanjun Hu, Xiaoping Ma, Linming Dou, Ying Chen
      Pages 113-122
    2. Hongmei Liu, Fenglian Shao, Jiwu Huang
      Pages 123-134
    3. Xiaoyun Wu, Xiaoping Liang, Hongmei Liu, Jiwu Huang, Guoping Qiu
      Pages 135-145
  6. Software Issues

  7. Fingerprinting and Image Authentication

    1. Seunglim Yong, Sang-Ho Lee
      Pages 192-202
    2. Takaaki Mizuki, Satoshi Nounin, Hideaki Sone, Yousuke Toyota
      Pages 203-216
    3. Taehae Kim, Yongwha Chung, Seunghwan Jung, Daesung Moon
      Pages 217-227
  8. Supporting Cryptographic Technology

    1. Miodrag J. Mihaljević, Marc P. C. Fossorier, Hideki Imai
      Pages 228-245
    2. Andre Adelsbach, Ulrich Greveler
      Pages 246-257
    3. Miodrag J. Mihaljević, Marc P. C. Fossorier, Hideki Imai
      Pages 258-276
    4. Jacques J. A. Fournier, Simon Moore
      Pages 277-297
  9. P2P Issues

    1. Xiaoming Wang, Bin Zhu, Shipeng Li
      Pages 298-310
    2. Youngho Park, Jung-Hwa Shin, Kyung-Hyune Rhee
      Pages 311-321
  10. Implementations and Architectures

  11. Back Matter

About these proceedings


The First International Conference on Digital Rights Management: Technology, Issues, Challenges and Systems (DRMTICS – pronounced ‘dramatics’), took place in Sydney, Australia on 31st October - 2nd November, 2005. It was or- nized by the Centre for Information Security of the University of Wollongong and in cooperation with the International Association of Cryptologic Research (IACR) and IEEE Computer Society’s Task Force on Information Assurance. DRMTICS isan internationalconferenceseriesthat coversthe areaof digital rights management, including research advancements of an applied and theor- ical nature. The goal is to have a broad coverage of the ?eld and related issues and subjects as the area evolves. Since the Internet and the computing infr- tructure has turned into a marketplace for content where information goods of various kinds are exchanged, this area is expected to grow and be part of the ongoing evolution of the information society. The DRM area is a unique blend of many diverse disciplines that include mathematics and cryptography, legal and social aspects, signal processing and watermarking, game theory, infor- tion theory, software and systems design and business analysis, and DRMTICS attempts to cover as much ground as possible, and to cover new results that will further spur new investigations on the foundations and practices of DRM. We hope that this ?rst conference marks the beginning of a fruitful and useful series of future conferences. This year, the conference received 57 submissions out of which 26 were - cepted for presentation after a rigorous refereeing process.


assurance authentication broadcast encryption cryptographic protocols data integrity digital payment digital rights management digital signature schemes fingerprinting image authentication information hiding information security integrity veri

Editors and affiliations

  • Reihaneh Safavi-Naini
    • 1
  • Moti Yung
    • 2
  1. 1.Department of Computer ScienceUniversity of CalgaryCalgary
  2. 2.Computer Science DepartmentGoogle Inc. and Columbia University,New YorkUSA

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2006
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-540-35998-2
  • Online ISBN 978-3-540-35999-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site