Please use this identifier to cite or link to this item:
https://repository.unej.ac.id/xmlui/handle/123456789/82401
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Prihandoko, Antonius Cahya | - |
dc.contributor.author | Ghodosi, Hossein | - |
dc.contributor.author | Litow, Bruce | - |
dc.date.accessioned | 2017-10-20T06:34:14Z | - |
dc.date.available | 2017-10-20T06:34:14Z | - |
dc.date.issued | 2017-10-20 | - |
dc.identifier.issn | 2503-250X | - |
dc.identifier.uri | http://repository.unej.ac.id/handle/123456789/82401 | - |
dc.description | Informatics Journal, Vol. 1 No.1 (2016) | en_US |
dc.description.abstract | In the DRM environment, content is usually distributed in an encrypted form. Typically, a secure encryption algorithm is utilized to accomplish such protection. However, executing this algorithm in an insecure environment may allow adversaries to compromise the system and obtain information about the decryption key. Keeping such a key secret is a major challenge for content distribution systems. We consider two solutions for securing content delivery. The first solution involves modifying the algorithm in such a way as to make implementation unintelligible. The second solution involves setting a buyer-seller protocol to communicate the key securely. In addition, the protocol can be set to achieve security for the content provider and privacy protection for user. This paper describes a study of these scenarios for DRM applications w.r.t securing content delivery. | en_US |
dc.language.iso | en | en_US |
dc.subject | Digital Rights Management | en_US |
dc.subject | Code Obfuscation | en_US |
dc.subject | White-box Cryptography | en_US |
dc.subject | Onetime Program | en_US |
dc.subject | Oblivious Transfer | en_US |
dc.title | Scenarios for Securing Content Delivery in the DRM Environment | en_US |
dc.type | Article | en_US |
Appears in Collections: | LSP-Jurnal Ilmiah Dosen |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
PS. SI_Jurnal_Antonius C_Scenarios for Securing.pdf | 1.4 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.