Circumvention

Results: 818



#Item
81Agent-Based Modeling of User Circumvention of Security Position Paper Vijay Kothari Jim Blythe

Agent-Based Modeling of User Circumvention of Security Position Paper Vijay Kothari Jim Blythe

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2014-06-10 16:10:16
82Access to Educational and Cultural materials Following the 2006 Amendments:  Are the reforms achieving their intended goals

Access to Educational and Cultural materials Following the 2006 Amendments: Are the reforms achieving their intended goals

Add to Reading List

Source URL: www.cyberlawcentre.org

Language: English - Date: 2013-12-09 02:36:09
83Mismorphism: a Semiotic Model of Computer Security Circumvention (Extended Version) Computer Science Technical Report TR2015-768 Dartmouth College  S.W. Smith

Mismorphism: a Semiotic Model of Computer Security Circumvention (Extended Version) Computer Science Technical Report TR2015-768 Dartmouth College S.W. Smith

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2015-03-29 15:47:20
84Rollen, Rechte, Identitäten - Eine Aufgabe des Informationsmanagements Digital rights management systems in context: legal, political and technical issues 8 October 2003, Berlin Teresa Hackett

Rollen, Rechte, Identitäten - Eine Aufgabe des Informationsmanagements Digital rights management systems in context: legal, political and technical issues 8 October 2003, Berlin Teresa Hackett

Add to Reading List

Source URL: dini.de

Language: English - Date: 2013-10-18 01:21:41
85MOUNTAINS OUT OF MOLEHILLS : HOW B ELIEVING THE WORST M AKES TECHNOLOGISTS I NEFFECTIVE , A ND W HAT T HEY CAN DO ABOUT IT by Lee A. Hollaar, Ph.D.  Synopsis: Technologists, and particularly computer programmers, seem to

MOUNTAINS OUT OF MOLEHILLS : HOW B ELIEVING THE WORST M AKES TECHNOLOGISTS I NEFFECTIVE , A ND W HAT T HEY CAN DO ABOUT IT by Lee A. Hollaar, Ph.D. Synopsis: Technologists, and particularly computer programmers, seem to

Add to Reading List

Source URL: digital-law-online.info

Language: English - Date: 2007-05-06 12:16:15
86WHAT’S “FAIR”? WHY THOSE CONCERNED ABOUT COPYRIGHT FAIR USE NEED TO SAY WHAT THEY MEAN by Lee A. Hollaar, Ph.D.  Synopsis: While many people in the copyright debate talk about “fair use,” they seldom say

WHAT’S “FAIR”? WHY THOSE CONCERNED ABOUT COPYRIGHT FAIR USE NEED TO SAY WHAT THEY MEAN by Lee A. Hollaar, Ph.D. Synopsis: While many people in the copyright debate talk about “fair use,” they seldom say

Add to Reading List

Source URL: digital-law-online.info

Language: English - Date: 2007-05-06 12:16:11
87Microsoft Word - Submission_KWeatherall_SenateSelectCommittee2.doc

Microsoft Word - Submission_KWeatherall_SenateSelectCommittee2.doc

Add to Reading List

Source URL: www.ipria.org

Language: English - Date: 2008-07-17 03:03:53
88Evading Censorship with Browser-Based Proxies David Fifield1 , Nate Hardison1 , Jonathan Ellithorpe1 , Emily Stark2 , Dan Boneh1 , Roger Dingledine3 , and Phil Porras4 1  2

Evading Censorship with Browser-Based Proxies David Fifield1 , Nate Hardison1 , Jonathan Ellithorpe1 , Emily Stark2 , Dan Boneh1 , Roger Dingledine3 , and Phil Porras4 1 2

Add to Reading List

Source URL: freehaven.net

Language: English - Date: 2012-05-01 13:41:51
89Still “Bad”: A Critique of the Latest Attempt to Gut the DMCA by Lee A. Hollaar, Ph.D. Synopsis: Congressman Rick Boucher’s latest proposal to make significant changes to the Digital Millennium Copyright Act (DMCA)

Still “Bad”: A Critique of the Latest Attempt to Gut the DMCA by Lee A. Hollaar, Ph.D. Synopsis: Congressman Rick Boucher’s latest proposal to make significant changes to the Digital Millennium Copyright Act (DMCA)

Add to Reading List

Source URL: digital-law-online.info

Language: English - Date: 2008-04-17 13:27:13
90

PDF Document

Add to Reading List

Source URL: copyright.gov

Language: English - Date: 2015-02-09 14:49:37