نتایج جستجو برای: copy protection
تعداد نتایج: 227907 فیلتر نتایج به سال:
Traceability schemes that are applied to broadcast encryption can prevent unauthorized parties from accessing the distributed data. In a traceability scheme, distributor broadcasts encrypted data and gives each authorized user unique key identifying word selected error-correcting code for decrypting. The following attack is possible in these schemes: groups of c malicious users join into coalit...
OBJECTIVES To ascertain how UK accident and emergency (A&E) departments access the child protection register, their levels of satisfaction with that access and their criteria for checking the register. METHODS A postal questionnaire was sent to 254 "major" A&E departments listed in the 1996 British Association for Accident and Emergency Medicine directory. RESULTS 190 questionnaires were re...
When high-resolution, copyrighted photographic images are displayed on the Internet, they must be protected from being copied by screen capture or by file. HTML and a Web browser alone do not provide protection, e .g., screen capture by a standalone program can not be prevented. This paper describes a Java system that provides copy protection for Internet display of photographic images organize...
due to high speed computer networks, the use of digitally formatted data has increased many folds.the digital data can be duplicated and edited with great ease which has led to a need for effectivecopyright protection tools. digital watermarking is a technology of embedding watermark withintellectual property rights into images, videos, audios and other multimedia data by a certainalgorithm .di...
The ubiquity of broadband digital communications and mass storage in modern society has stimulated the widespread acceptance of digital media. However, easy access to royalty-free digital media has also resulted in a reduced perception in society of the intellectual value of digital media and has promoted unauthorized duplication practices. To detect and discourage the unauthorized duplication ...
High performance networks (e.g. Infiniband) rely on zero-copy operations for performance. Zero-copy operations, as the name implies, avoid copying buffers for sending and receiving data. Instead, hardware devices directly read and write to application specified areas of memory. Since modern high-performance networks can send and receive at nearly the same speed as the memory bus inside machines...
Web applications are becoming the dominant way to provide access to online services. At the same time, web application vulnerabilities are being discovered and disclosed at an alarming rate. Web applications often make use of JavaScript code that is embedded into web pages to support dynamic client-side behavior. This script code is executed in the context of the user’s web browser. To protect ...
This paper analyzes the secure protocols in the digital transmission copy protection (DTCP) specification. The full authentication protocol in the specification is a combination of the Diffie-Hellman (DH) key exchange algorithm and the digital signature technique. It is claimed that the protocol can prevent “man in the middle” attacks. However, we can apply at least three classical attacks to t...
There are a lot of methods to fight against software illegal use, which can be divided into two major groups: software-based protection and hardware-based protection. One of the popular hardware-based software copy protection methods is based on special hardware called “dongle”. Dongle is a small USB, RS232 or LPT interface device usually, like USB flash pen, which protects applications from be...
Man-At-The-End (MATE) attacks and fortifications are difficult to analyze, model, and evaluate predominantly for three reasons: firstly, the attacker is human and, therefore, utilizes motivation, creativity, and ingenuity. Secondly, the attacker has limitless and authorized access to the target. Thirdly, all major protections stand up to a determined attacker till a certain period of time. Digi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید