2006
DOI: 10.1007/11751595_56
|View full text |Cite
|
Sign up to set email alerts
|

A Practical Solution for Distribution Rights Protection in Multicast Environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2011
2011
2012
2012

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 13 publications
0
1
0
Order By: Relevance
“…6,7 The problem is its security relying on extra hardware equipment or nodes, allowing security attacks to take place after decryption and before fingerprinting. 6,7 The problem is its security relying on extra hardware equipment or nodes, allowing security attacks to take place after decryption and before fingerprinting.…”
Section: Introductionmentioning
confidence: 99%
“…6,7 The problem is its security relying on extra hardware equipment or nodes, allowing security attacks to take place after decryption and before fingerprinting. 6,7 The problem is its security relying on extra hardware equipment or nodes, allowing security attacks to take place after decryption and before fingerprinting.…”
Section: Introductionmentioning
confidence: 99%