|
![]() |
|||
|
||||
OverviewCryptography is an area that traditionally focused on secure communication, authentication and integrity. In recent times though, there is a wealth of novel fine-tuned cryptographic techniques that sprung up as cryptographers focused on the specialised problems that arise in digital content distribution. These include fingerprinting codes, traitor tracing, broadcast encryption and others. This book is an introduction to this new generation of cryptographic mechanisms as well as an attempt to provide a cohesive presentation of these techniques. Encryption for Digital Content details the subset cover framework (currently used in the AACS encryption of Blu-Ray disks), fingerprinting codes, traitor tracing schemes as well as related security models and attacks. It provides an extensive treatment of the complexity of the revocation problem for multi-receiver (subscriber) encryption mechanisms, as well as the complexity of the traceability problem. Pirate evolution type of attacks are covered in depth. This volume also illustrates the manner that attacks affect parameter selection, and how this impacts implementations. The authors gratefully acknowledge the support of the National Science Foundation under Grant No. 0447808. Full Product DetailsAuthor: Aggelos Kiayias , Serdar PehlivanogluPublisher: Springer-Verlag New York Inc. Imprint: Springer-Verlag New York Inc. Edition: 2010 ed. Volume: 52 Dimensions: Width: 15.50cm , Height: 1.40cm , Length: 23.50cm Weight: 1.090kg ISBN: 9781441900432ISBN 10: 1441900438 Pages: 209 Publication Date: 02 November 2010 Audience: Professional and scholarly , Professional & Vocational Format: Hardback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of ContentsFingerprinting Codes.- Broadcast Encryption.- Traitor Tracing.- Trace and Revoke Schemes.- Pirate Evolution.ReviewsFrom the reviews: This book provides several cryptographic mechanisms for protecting digital content. ... With the necessary prerequisites, even readers with no prior knowledge of cryptography can gain a basic understanding of this field. ... each chapter ends with a detailed bibliographic note, which is useful for further study. The book is based in part on Pehlivanoglu's doctoral thesis, which implies that it will provide a state-of-the-art overview of encryption for digital content. ... Overall, I recommend this survey of digital content encryption for cryptographers and professional engineers. (Zheng Gong, ACM Computing Reviews, May, 2011) From the reviews: This book provides several cryptographic mechanisms for protecting digital content. ... With the necessary prerequisites, even readers with no prior knowledge of cryptography can gain a basic understanding of this field. ... each chapter ends with a detailed bibliographic note, which is useful for further study. The book is based in part on Pehlivanoglu's doctoral thesis, which implies that it will provide a state-of-the-art overview of encryption for digital content. ... Overall, I recommend this survey of digital content encryption for cryptographers and professional engineers. (Zheng Gong, ACM Computing Reviews, May, 2011) From the reviews: “This book provides several cryptographic mechanisms for protecting digital content. … With the necessary prerequisites, even readers with no prior knowledge of cryptography can gain a basic understanding of this field. … each chapter ends with a detailed bibliographic note, which is useful for further study. The book is based in part on Pehlivanoglu’s doctoral thesis, which implies that it will provide a state-of-the-art overview of encryption for digital content. … Overall, I recommend this survey of digital content encryption for cryptographers and professional engineers.” (Zheng Gong, ACM Computing Reviews, May, 2011) Author InformationTab Content 6Author Website:Countries AvailableAll regions |