{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T02:59:42Z","timestamp":1761101982113,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1109\/isias.2011.6122785","type":"proceedings-article","created":{"date-parts":[[2012,1,11]],"date-time":"2012-01-11T17:01:11Z","timestamp":1326301271000},"page":"1-6","source":"Crossref","is-referenced-by-count":4,"title":["A DRM framework towards preventing digital piracy"],"prefix":"10.1109","author":[{"given":"Ravi Sankar","family":"Veerubhotla","sequence":"first","affiliation":[]},{"given":"Ashutosh","family":"Saxena","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Open Digital Rights Language (ODRL)","year":"0","key":"13"},{"key":"14","first-page":"250","article-title":"White-Box Cryptography and an AES Implementation","volume":"2595","author":"chow","year":"2003","journal-title":"LNCS"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1027797"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/CMPSAC.2000.884716"},{"journal-title":"Adobe Content Server","year":"0","key":"3"},{"journal-title":"AD RMS Active Directory Digital Rights Management Overview","year":"0","key":"2"},{"journal-title":"Digital Rights Management - A Survey of Existing Technologies","year":"2005","author":"michiels","key":"1"},{"key":"10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/3-540-44647-8_1","article-title":"On the (Im)possibility of Obfuscating Programs","volume":"2139","author":"barak","year":"2001","journal-title":"Lecture Notes in Computer Science"},{"key":"7","first-page":"160","article-title":"Protecting Software Code by Guards","author":"chang","year":"2001","journal-title":"Proc ACM Workshop Security and Privacy in Digital Rights Management"},{"journal-title":"Code Obfuscation Literature Survey","year":"2005","author":"balakrishnan","key":"6"},{"journal-title":"DRM-JVM Digital-Rights-Management-Enabled Java Virtual Machine","year":"0","key":"5"},{"journal-title":"WebGuard A System for Web Content Protection","year":"0","key":"4"},{"key":"9","first-page":"317","article-title":"Tamper Resistant Software: An Implementation","volume":"1174","author":"aucsmith","year":"1996","journal-title":"LNCS"},{"key":"8","first-page":"168","article-title":"Architectural Support for Copy and Tamper Resistant Software","author":"lie","year":"2000","journal-title":"Proc Int l Conf Architectural Support for Programming Languages and Operating Systems"}],"event":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","start":{"date-parts":[[2011,12,5]]},"location":"Melacca, Malaysia","end":{"date-parts":[[2011,12,8]]}},"container-title":["2011 7th International Conference on Information Assurance and Security (IAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6112288\/6122777\/06122785.pdf?arnumber=6122785","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T08:36:58Z","timestamp":1497947818000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6122785\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/isias.2011.6122785","relation":{},"subject":[],"published":{"date-parts":[[2011,12]]}}}