Latest books

Archives

Read e-book online Digital Rights Management: ACM CCS-9 Workshop, DRM 2002, PDF

By Stanley Chow, Phil Eisen, Harold Johnson, Paul C. van Oorschot (auth.), Joan Feigenbaum (eds.)

ISBN-10: 3540404104

ISBN-13: 9783540404101

This booklet constitutes the completely refereed post-proceedings of the second one overseas Workshop on electronic Rights administration, DRM 2002, held in Washington, DC, united states, in November 2002, together with ACM CCS-9.

The thirteen revised complete papers awarded have been rigorously reviewed and chosen for inclusion within the publication. one of the subject matters addressed are DES implementation for DRM purposes, cryptographic assaults, business demanding situations, public key broadcast encryption, fingerprinting, copy-prevention strategies, copyright barriers, content material safety, watermarking structures, and theft-protected proprietary certificates.

Show description

Read Online or Download Digital Rights Management: ACM CCS-9 Workshop, DRM 2002, Washington, DC, USA, November 18, 2002. Revised Papers PDF

Best international conferences and symposiums books

Read e-book online Digital Rights Management: ACM CCS-9 Workshop, DRM 2002, PDF

This e-book constitutes the completely refereed post-proceedings of the second one foreign Workshop on electronic Rights administration, DRM 2002, held in Washington, DC, united states, in November 2002, along side ACM CCS-9. The thirteen revised complete papers provided have been conscientiously reviewed and chosen for inclusion within the booklet.

Download e-book for iPad: Theoretical nuclear physics in Italy: proceedings of the by A. Covello, L. E. Marcucci, S. Rosati, I. Bombaci

This quantity supplies a finished evaluate of the most recent examine job undertaken within the box of theoretical nuclear physics in Italy. a number of themes of present curiosity are integrated: from nuclear topic and nuclear constitution to nuclear astrophysics and quark-gluon plasma.

Distributed Computing – IWDC 2005: 7th International - download pdf or read online

This booklet constitutes the refereed lawsuits of the seventh overseas Workshop on allotted Computing, IWDC 2004, held in Kharagpur, India in December 2005. The 28 revised complete papers and 33 revised brief papers awarded including five invited keynote talks have been conscientiously reviewed and chosen from 253 submissions.

Download PDF by Laurent Baduel, Satoshi Matsuoka (auth.), Eduardo Tovar,: Principles of Distributed Systems: 11th International

This publication constitutes the refereed court cases of the eleventh overseas convention on ideas of allotted structures, OPODIS 2007, held in Guadeloupe, French West Indies, in December 2007. The 32 revised complete papers awarded have been rigorously reviewed and chosen from 106 submissions. The papers handle all present concerns in thought, specification, layout and implementation of allotted and embedded platforms.

Extra info for Digital Rights Management: ACM CCS-9 Workshop, DRM 2002, Washington, DC, USA, November 18, 2002. Revised Papers

Example text

In an important variant called “asymmetric” traitor tracing, the system-manager is not necessarily trusted, thus the tracing procedure must produce undeniable proof of the implication of the traitor subscribers. This non-repudiation property of asymmetric schemes has the potential to significantly increase the effectiveness of the tracing procedure against piracy. In this work, we break the two previous proposals for efficient asymmetric public-key traitor tracing, by showing how traitors can evade the proposed traitor tracing procedures.

T. some given base h0 , . . , hv is as hard as the discrete-log problem over G. 1 Oblivious Polynomial Evaluation A tool that is instrumental in obtaining the non-repudiation property of our scheme is Oblivious Polynomial Evaluation (OPE). An OPE protocol involves two parties, the sender S, who possesses a secret polynomial P ∈ Zq [x], and the receiver R who possesses a secret value α ∈ Zq . e. compute P (α)) in such a way so that: – The sender S cannot extract any non-trivial information about the value α.

H2v , h . Proof. If κu = Q(zu , αu ), zu , zu2 , . . , zu2v , αu , observe that 2v 2v (h0 )Q(zu ,αu ) (h1 )zu . . t the base h0 , . . , h2v , h . Further, note that due to the malleability and security of the OPE variant, it follows that an oracle to an invocation of the registration procedure can be simulated by giving a truly random point of the bivariate polynomial Q. This suggests that a malicious adversary cannot create subscribers for which he controls the point over which the system’s polynomial Q is evaluated.

Download PDF sample

Digital Rights Management: ACM CCS-9 Workshop, DRM 2002, Washington, DC, USA, November 18, 2002. Revised Papers by Stanley Chow, Phil Eisen, Harold Johnson, Paul C. van Oorschot (auth.), Joan Feigenbaum (eds.)


by James
4.1

Rated 4.65 of 5 – based on 9 votes

Comments are closed.