Copyright Protection

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 21486 Experts worldwide ranked by ideXlab platform

Ritesh Jain - One of the best experts on this subject based on the ideXlab platform.

  • a secure multicast protocol with Copyright Protection
    ACM Special Interest Group on Data Communication, 2002
    Co-Authors: Lintian Qiao, Klara Nahrstedt, Hua Wang, Ritesh Jain
    Abstract:

    We present a simple, efficient, and secure multicast protocol with Copyright Protection in an open and insecure network environment. There is a wide variety of multimedia applications that can benefit from using our secure multicast protocol, e.g., the commercial pay-per-view video multicast, or highly secure military intelligence video conference. Our secure multicast protocol is designed to achieve the following goals. (1) It can run in any open network environment. It does not rely on any security mechanism on intermediate network switches or routers. (2) It can be built on top of any existing multicast architecture. (3) Our key distribution protocol is both secure and robust in the presence of long delay or membership message. (4) It can support dynamic group membership, e.g., JOIN/LEAVE/EXPEL operations, in a network bandwidth efficient manner. (5) It can provide Copyright Protection for the information provider. (6) It can help to identify insiders in the multicast session who are leaking information to the outside world. We have implemented a prototype system which validates our secure multicast protocol and evaluated it against various performance matrices. The experimental results are very encouraging, but also show where new engineering approaches need to be deployed to conform fully to the design goals.

Lintian Qiao - One of the best experts on this subject based on the ideXlab platform.

  • a secure multicast protocol with Copyright Protection
    ACM Special Interest Group on Data Communication, 2002
    Co-Authors: Lintian Qiao, Klara Nahrstedt, Hua Wang, Ritesh Jain
    Abstract:

    We present a simple, efficient, and secure multicast protocol with Copyright Protection in an open and insecure network environment. There is a wide variety of multimedia applications that can benefit from using our secure multicast protocol, e.g., the commercial pay-per-view video multicast, or highly secure military intelligence video conference. Our secure multicast protocol is designed to achieve the following goals. (1) It can run in any open network environment. It does not rely on any security mechanism on intermediate network switches or routers. (2) It can be built on top of any existing multicast architecture. (3) Our key distribution protocol is both secure and robust in the presence of long delay or membership message. (4) It can support dynamic group membership, e.g., JOIN/LEAVE/EXPEL operations, in a network bandwidth efficient manner. (5) It can provide Copyright Protection for the information provider. (6) It can help to identify insiders in the multicast session who are leaking information to the outside world. We have implemented a prototype system which validates our secure multicast protocol and evaluated it against various performance matrices. The experimental results are very encouraging, but also show where new engineering approaches need to be deployed to conform fully to the design goals.

Hua Wang - One of the best experts on this subject based on the ideXlab platform.

  • a secure multicast protocol with Copyright Protection
    ACM Special Interest Group on Data Communication, 2002
    Co-Authors: Lintian Qiao, Klara Nahrstedt, Hua Wang, Ritesh Jain
    Abstract:

    We present a simple, efficient, and secure multicast protocol with Copyright Protection in an open and insecure network environment. There is a wide variety of multimedia applications that can benefit from using our secure multicast protocol, e.g., the commercial pay-per-view video multicast, or highly secure military intelligence video conference. Our secure multicast protocol is designed to achieve the following goals. (1) It can run in any open network environment. It does not rely on any security mechanism on intermediate network switches or routers. (2) It can be built on top of any existing multicast architecture. (3) Our key distribution protocol is both secure and robust in the presence of long delay or membership message. (4) It can support dynamic group membership, e.g., JOIN/LEAVE/EXPEL operations, in a network bandwidth efficient manner. (5) It can provide Copyright Protection for the information provider. (6) It can help to identify insiders in the multicast session who are leaking information to the outside world. We have implemented a prototype system which validates our secure multicast protocol and evaluated it against various performance matrices. The experimental results are very encouraging, but also show where new engineering approaches need to be deployed to conform fully to the design goals.

Klara Nahrstedt - One of the best experts on this subject based on the ideXlab platform.

  • a secure multicast protocol with Copyright Protection
    ACM Special Interest Group on Data Communication, 2002
    Co-Authors: Lintian Qiao, Klara Nahrstedt, Hua Wang, Ritesh Jain
    Abstract:

    We present a simple, efficient, and secure multicast protocol with Copyright Protection in an open and insecure network environment. There is a wide variety of multimedia applications that can benefit from using our secure multicast protocol, e.g., the commercial pay-per-view video multicast, or highly secure military intelligence video conference. Our secure multicast protocol is designed to achieve the following goals. (1) It can run in any open network environment. It does not rely on any security mechanism on intermediate network switches or routers. (2) It can be built on top of any existing multicast architecture. (3) Our key distribution protocol is both secure and robust in the presence of long delay or membership message. (4) It can support dynamic group membership, e.g., JOIN/LEAVE/EXPEL operations, in a network bandwidth efficient manner. (5) It can provide Copyright Protection for the information provider. (6) It can help to identify insiders in the multicast session who are leaking information to the outside world. We have implemented a prototype system which validates our secure multicast protocol and evaluated it against various performance matrices. The experimental results are very encouraging, but also show where new engineering approaches need to be deployed to conform fully to the design goals.

Luo Yi-shu - One of the best experts on this subject based on the ideXlab platform.

  • Watermark Based Copyright Protection of Outsourced Database
    2006 10th International Database Engineering and Applications Symposium (IDEAS'06), 2006
    Co-Authors: Zhu Qin, Yang Ying, Le Jia-jin, Luo Yi-shu
    Abstract:

    In outsourced database system, data owners delegate their database needs and functionalities to a third-party that provides services to the users of the database. Since the third party can be seldom trusted or can be compromised, it is important to provide Copyright Protection for outsourced database. In this paper a novel scheme of Copyright Protection for outsourced database based on digital watermarking is proposed. In the presented system, watermark is embedded into the database under the control of both the secret key and the chaotic random numbers. No original database is needed during watermark detection, and the Copyright is judged by the match rate of watermark. The analyses of attacks towards watermark and the results of the experiments show that this system possesses high robustness and availability