The Community for Technology Leaders
RSS Icon
Issue No.04 - April (2009 vol.42)
pp: 28-34
Seong Oun Hwang , Hongik University, Republic of Korea
Technologies that aim to protect digital content have fallen short of their mission. The computing community must find ways to make protection schemes interoperable and adopt a use model that lifts restrictions on paid-for protected content.
IPv6, IPv4, network security, network attacks, IPSec, Internet Protocol
Seong Oun Hwang, "How Viable Is Digital Rights Management?", Computer, vol.42, no. 4, pp. 28-34, April 2009, doi:10.1109/MC.2009.120
1. "Common Criteria for Information Technology Security Evaluation, v 2.1 (ISO/IEC 15408)," NIST, 2000.
2. B. Barak et al., "On the (Im)possibility of Obfuscating Programs," Proc. Advances in Cryptology (Crypto 01), Springer, 2001, pp. 1-18.
3. S. Goldwasser and Y. Tauman Kalai, "On the Impossibility of Obfuscation with Auxiliary Inputs," Proc. 46th IEEE Symp. Foundations of Computer Science (FOCS 05), IEEE Press, 2005, pp. 553-562.
4. D. Boneh and J. Shaw, "Collusion-Secure Fingerprinting for Digital Data," IEEE Trans. Information Theory, vol. 44, no.5, IEEE Press, 1998, pp. 1897-1905.
450 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool