Title of article :
Protecting cryptographic keys: the trace-and-revoke approach
Author/Authors :
D.، Naor, نويسنده , , M.، Naor, نويسنده ,
Issue Information :
روزنامه با شماره پیاپی سال 2003
Pages :
-46
From page :
47
To page :
0
Abstract :
The authors describe two methods for protecting content by creating a legitimate distribution channel. One method broadcasts encrypted data to a selected set of users, and a tracing algorithm uncovers a compromised keyʹs owner. The other method updates user keys to resecure a compromised network.
Keywords :
black hole physics , gravitational waves
Journal title :
COMPUTER
Serial Year :
2003
Journal title :
COMPUTER
Record number :
105266
Link To Document :
بازگشت