Please use this identifier to cite or link to this item: https://repository.unej.ac.id/xmlui/handle/123456789/82401
Full metadata record
DC FieldValueLanguage
dc.contributor.authorPrihandoko, Antonius Cahya-
dc.contributor.authorGhodosi, Hossein-
dc.contributor.authorLitow, Bruce-
dc.date.accessioned2017-10-20T06:34:14Z-
dc.date.available2017-10-20T06:34:14Z-
dc.date.issued2017-10-20-
dc.identifier.issn2503-250X-
dc.identifier.urihttp://repository.unej.ac.id/handle/123456789/82401-
dc.descriptionInformatics Journal, Vol. 1 No.1 (2016)en_US
dc.description.abstractIn the DRM environment, content is usually distributed in an encrypted form. Typically, a secure encryption algorithm is utilized to accomplish such protection. However, executing this algorithm in an insecure environment may allow adversaries to compromise the system and obtain information about the decryption key. Keeping such a key secret is a major challenge for content distribution systems. We consider two solutions for securing content delivery. The first solution involves modifying the algorithm in such a way as to make implementation unintelligible. The second solution involves setting a buyer-seller protocol to communicate the key securely. In addition, the protocol can be set to achieve security for the content provider and privacy protection for user. This paper describes a study of these scenarios for DRM applications w.r.t securing content delivery.en_US
dc.language.isoenen_US
dc.subjectDigital Rights Managementen_US
dc.subjectCode Obfuscationen_US
dc.subjectWhite-box Cryptographyen_US
dc.subjectOnetime Programen_US
dc.subjectOblivious Transferen_US
dc.titleScenarios for Securing Content Delivery in the DRM Environmenten_US
dc.typeArticleen_US
Appears in Collections:LSP-Jurnal Ilmiah Dosen

Files in This Item:
File Description SizeFormat 
PS. SI_Jurnal_Antonius C_Scenarios for Securing.pdf1.4 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.