000 03223nam a22005415i 4500
001 u371084
003 SIRSI
005 20160812080108.0
007 cr nn 008mamaa
008 101029s2010 xxu| s |||| 0|eng d
020 _a9781441900449
_9978-1-4419-0044-9
040 _cMX-MeUAM
050 4 _aQA76.9.A25
082 0 4 _a005.82
_223
100 1 _aKiayias, Aggelos.
_eauthor.
245 1 0 _aEncryption for Digital Content
_h[recurso electrónico] /
_cby Aggelos Kiayias, Serdar Pehlivanoglu.
264 1 _aBoston, MA :
_bSpringer US,
_c2010.
300 _aXIII, 209 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aAdvances in Information Security,
_x1568-2633 ;
_v52
505 0 _aFingerprinting Codes -- Broadcast Encryption -- Traitor Tracing -- Trace and Revoke Schemes -- Pirate Evolution.
520 _aCryptography is an area that traditionally focused on secure communication, authentication and integrity. In recent times though, there is a wealth of novel  fine-tuned cryptographic techniques that sprung up as cryptographers focused on the specialised problems that arise in digital content distribution. These include fingerprinting codes, traitor tracing, broadcast encryption and others. This book is an introduction to this new generation of cryptographic mechanisms as well as an attempt to provide a cohesive presentation of these techniques. Encryption for Digital Content details the subset cover framework (currently used in the AACS encryption of Blu-Ray disks), fingerprinting codes, traitor tracing schemes as well as related security models and attacks.   It provides an extensive treatment of the complexity of the revocation problem for multi-receiver (subscriber) encryption mechanisms, as well as the complexity of the traceability problem. Pirate evolution type of attacks are covered in depth. This volume also illustrates the manner that attacks affect parameter selection, and how this impacts implementations. The authors gratefully acknowledge the support of the National Science Foundation under Grant No. 0447808.
650 0 _aComputer science.
650 0 _aComputer Communication Networks.
650 0 _aData protection.
650 0 _aData structures (Computer science).
650 0 _aData encryption (Computer science).
650 0 _aCoding theory.
650 1 4 _aComputer Science.
650 2 4 _aData Encryption.
650 2 4 _aData Structures, Cryptology and Information Theory.
650 2 4 _aSystems and Data Security.
650 2 4 _aCoding and Information Theory.
650 2 4 _aData Structures.
650 2 4 _aComputer Communication Networks.
700 1 _aPehlivanoglu, Serdar.
_eauthor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9781441900432
830 0 _aAdvances in Information Security,
_x1568-2633 ;
_v52
856 4 0 _zLibro electrónico
_uhttp://148.231.10.114:2048/login?url=http://link.springer.com/book/10.1007/978-1-4419-0044-9
596 _a19
942 _cLIBRO_ELEC
999 _c198964
_d198964