dc.contributor.author | Prihandoko, Antonius Cahya | |
dc.contributor.author | Ghodosi, Hossein | |
dc.contributor.author | Litow, Bruce | |
dc.date.accessioned | 2017-10-20T06:34:14Z | |
dc.date.available | 2017-10-20T06:34:14Z | |
dc.date.issued | 2017-10-20 | |
dc.identifier.issn | 2503-250X | |
dc.identifier.uri | http://repository.unej.ac.id/handle/123456789/82401 | |
dc.description | Informatics Journal, Vol. 1 No.1 (2016) | en_US |
dc.description.abstract | In the DRM environment, content is usually distributed in an encrypted form. Typically, a
secure encryption algorithm is utilized to accomplish such protection. However, executing
this algorithm in an insecure environment may allow adversaries to compromise the system
and obtain information about the decryption key. Keeping such a key secret is a major
challenge for content distribution systems. We consider two solutions for securing content
delivery. The first solution involves modifying the algorithm in such a way as to make
implementation unintelligible. The second solution involves setting a buyer-seller protocol to
communicate the key securely. In addition, the protocol can be set to achieve security for the
content provider and privacy protection for user. This paper describes a study of these
scenarios for DRM applications w.r.t securing content delivery. | en_US |
dc.language.iso | en | en_US |
dc.subject | Digital Rights Management | en_US |
dc.subject | Code Obfuscation | en_US |
dc.subject | White-box Cryptography | en_US |
dc.subject | Onetime Program | en_US |
dc.subject | Oblivious Transfer | en_US |
dc.title | Scenarios for Securing Content Delivery in the DRM Environment | en_US |
dc.type | Article | en_US |