Sciweavers

12 search results - page 2 / 3
» License management scheme with anonymous trust for digital r...
Sort
View
WISA
2004
Springer
13 years 10 months ago
License Protection with a Tamper-Resistant Token
Content protection mechanisms are intended to enforce the usage rights on the content. These usage rights are carried by a license. Sometimes, a license even carries the key that i...
Cheun Ngen Chong, Bin Ren, Jeroen Doumen, Sandro E...
CCS
2006
ACM
13 years 8 months ago
Virtual monotonic counters and count-limited objects using a TPM without a trusted OS
A trusted monotonic counter is a valuable primitive that enables a wide variety of highly scalable offline and decentralized applications that would otherwise be prone to replay a...
Luis F. G. Sarmenta, Marten van Dijk, Charles W. O...
ISECS
2008
IEEE
13 years 11 months ago
Attacks on Two Buyer-Seller Watermarking Protocols and an Improvement for Revocable Anonymity
Buyer-seller watermarking protocols incorporate digital watermarking with cryptography, in order to protect digital copyrights and privacy rights for the seller and the buyer befo...
Mina Deng, Bart Preneel
SAC
2009
ACM
13 years 11 months ago
Secure web-based retrieval of documents with usage controls
Usage controls enable the provider of some information to limit how recipients may use it. Usage controls may be desirable in enterprise environments, e.g., for regulatory complia...
Peter Djalaliev, José Carlos Brustoloni
ICS
2003
Tsinghua U.
13 years 10 months ago
AEGIS: architecture for tamper-evident and tamper-resistant processing
We describe the architecture for a single-chip aegis processor which can be used to build computing systems secure against both physical and software attacks. Our architecture ass...
G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, M...