000 | 03234nam a22005535i 4500 | ||
---|---|---|---|
001 | 978-1-4419-0044-9 | ||
003 | DE-He213 | ||
005 | 20140220084502.0 | ||
007 | cr nn 008mamaa | ||
008 | 101029s2010 xxu| s |||| 0|eng d | ||
020 |
_a9781441900449 _9978-1-4419-0044-9 |
||
024 | 7 |
_a10.1007/978-1-4419-0044-9 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.82 _223 |
100 | 1 |
_aKiayias, Aggelos. _eauthor. |
|
245 | 1 | 0 |
_aEncryption for Digital Content _h[electronic resource] / _cby Aggelos Kiayias, Serdar Pehlivanoglu. |
264 | 1 |
_aBoston, MA : _bSpringer US, _c2010. |
|
300 |
_aXIII, 209 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aAdvances in Information Security, _x1568-2633 ; _v52 |
|
505 | 0 | _aFingerprinting Codes -- Broadcast Encryption -- Traitor Tracing -- Trace and Revoke Schemes -- Pirate Evolution. | |
520 | _aCryptography is an area that traditionally focused on secure communication, authentication and integrity. In recent times though, there is a wealth of novel fine-tuned cryptographic techniques that sprung up as cryptographers focused on the specialised problems that arise in digital content distribution. These include fingerprinting codes, traitor tracing, broadcast encryption and others. This book is an introduction to this new generation of cryptographic mechanisms as well as an attempt to provide a cohesive presentation of these techniques. Encryption for Digital Content details the subset cover framework (currently used in the AACS encryption of Blu-Ray disks), fingerprinting codes, traitor tracing schemes as well as related security models and attacks. It provides an extensive treatment of the complexity of the revocation problem for multi-receiver (subscriber) encryption mechanisms, as well as the complexity of the traceability problem. Pirate evolution type of attacks are covered in depth. This volume also illustrates the manner that attacks affect parameter selection, and how this impacts implementations. The authors gratefully acknowledge the support of the National Science Foundation under Grant No. 0447808. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer Communication Networks. | |
650 | 0 | _aData protection. | |
650 | 0 | _aData structures (Computer science). | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aCoding theory. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aData Encryption. |
650 | 2 | 4 | _aData Structures, Cryptology and Information Theory. |
650 | 2 | 4 | _aSystems and Data Security. |
650 | 2 | 4 | _aCoding and Information Theory. |
650 | 2 | 4 | _aData Structures. |
650 | 2 | 4 | _aComputer Communication Networks. |
700 | 1 |
_aPehlivanoglu, Serdar. _eauthor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9781441900432 |
830 | 0 |
_aAdvances in Information Security, _x1568-2633 ; _v52 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-1-4419-0044-9 |
912 | _aZDB-2-SCS | ||
999 |
_c110174 _d110174 |