Show simple item record

dc.contributor.authorPrihandoko, Antonius Cahya
dc.contributor.authorGhodosi, Hossein
dc.contributor.authorLitow, Bruce
dc.date.accessioned2017-10-20T06:34:14Z
dc.date.available2017-10-20T06:34:14Z
dc.date.issued2017-10-20
dc.identifier.issn2503-250X
dc.identifier.urihttp://repository.unej.ac.id/handle/123456789/82401
dc.descriptionInformatics Journal, Vol. 1 No.1 (2016)en_US
dc.description.abstractIn the DRM environment, content is usually distributed in an encrypted form. Typically, a secure encryption algorithm is utilized to accomplish such protection. However, executing this algorithm in an insecure environment may allow adversaries to compromise the system and obtain information about the decryption key. Keeping such a key secret is a major challenge for content distribution systems. We consider two solutions for securing content delivery. The first solution involves modifying the algorithm in such a way as to make implementation unintelligible. The second solution involves setting a buyer-seller protocol to communicate the key securely. In addition, the protocol can be set to achieve security for the content provider and privacy protection for user. This paper describes a study of these scenarios for DRM applications w.r.t securing content delivery.en_US
dc.language.isoenen_US
dc.subjectDigital Rights Managementen_US
dc.subjectCode Obfuscationen_US
dc.subjectWhite-box Cryptographyen_US
dc.subjectOnetime Programen_US
dc.subjectOblivious Transferen_US
dc.titleScenarios for Securing Content Delivery in the DRM Environmenten_US
dc.typeArticleen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record