The Community for Technology Leaders
RSS Icon
Issue No.07 - July (2003 vol.36)
pp: 47-53
Dalit Naor , IBM Haifa Research Lab
Moni Naor , Weizmann Institute of Science
<p>Technology can offer options that apply any combination of content protection, hardware and software tamper resistance, or cryptographic keys to achieve content-ownership protection. The authors describe two methods for protecting content by creating a legitimate distribution channel. One method broadcasts encrypted data to a selected set of users and uses a tracing algorithm to uncover the compromised key?s owner. The other method updates user keys to resecure a compromised network.</p><p></p>
Dalit Naor, Moni Naor, "Protecting Cryptographic Keys: The Trace-and-Revoke Approach", Computer, vol.36, no. 7, pp. 47-53, July 2003, doi:10.1109/MC.2003.1212690
35 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool