|
|
|
|
LEADER |
03252nam a22005535i 4500 |
001 |
978-1-4419-0044-9 |
003 |
DE-He213 |
005 |
20151125151239.0 |
007 |
cr nn 008mamaa |
008 |
101029s2010 xxu| s |||| 0|eng d |
020 |
|
|
|a 9781441900449
|9 978-1-4419-0044-9
|
024 |
7 |
|
|a 10.1007/978-1-4419-0044-9
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a URY
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.82
|2 23
|
100 |
1 |
|
|a Kiayias, Aggelos.
|e author.
|
245 |
1 |
0 |
|a Encryption for Digital Content
|h [electronic resource] /
|c by Aggelos Kiayias, Serdar Pehlivanoglu.
|
264 |
|
1 |
|a Boston, MA :
|b Springer US,
|c 2010.
|
300 |
|
|
|a XIII, 209 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Advances in Information Security,
|x 1568-2633 ;
|v 52
|
505 |
0 |
|
|a Fingerprinting Codes -- Broadcast Encryption -- Traitor Tracing -- Trace and Revoke Schemes -- Pirate Evolution.
|
520 |
|
|
|a Cryptography is an area that traditionally focused on secure communication, authentication and integrity. In recent times though, there is a wealth of novel fine-tuned cryptographic techniques that sprung up as cryptographers focused on the specialised problems that arise in digital content distribution. These include fingerprinting codes, traitor tracing, broadcast encryption and others. This book is an introduction to this new generation of cryptographic mechanisms as well as an attempt to provide a cohesive presentation of these techniques. Encryption for Digital Content details the subset cover framework (currently used in the AACS encryption of Blu-Ray disks), fingerprinting codes, traitor tracing schemes as well as related security models and attacks. It provides an extensive treatment of the complexity of the revocation problem for multi-receiver (subscriber) encryption mechanisms, as well as the complexity of the traceability problem. Pirate evolution type of attacks are covered in depth. This volume also illustrates the manner that attacks affect parameter selection, and how this impacts implementations. The authors gratefully acknowledge the support of the National Science Foundation under Grant No. 0447808.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data structures (Computer science).
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Coding theory.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a Data Structures, Cryptology and Information Theory.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Coding and Information Theory.
|
650 |
2 |
4 |
|a Data Structures.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
700 |
1 |
|
|a Pehlivanoglu, Serdar.
|e author.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9781441900432
|
830 |
|
0 |
|a Advances in Information Security,
|x 1568-2633 ;
|v 52
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-1-4419-0044-9
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
950 |
|
|
|a Computer Science (Springer-11645)
|