How to (Selectively) Broadcast A Secret

@article{Simmons1985HowT,
  title={How to (Selectively) Broadcast A Secret},
  author={Gustavus J. Simmons},
  journal={1985 IEEE Symposium on Security and Privacy},
  year={1985},
  pages={108-108}
}
At the 1982 Symposium on Security and Privacy, a software protection scheme [1] devised by George Purdy, James Studier and the present author was presented. Unfortunately, the cryptographic protocol in that scheme was fatally flawed making it possible for a "pirate" who observed the communica-tions between a software vendor and a legitimate licensee to forge a license that would permit him to also use the protected software. In the course of analyzing the reasons for this weakness in the… CONTINUE READING
Highly Cited
This paper has 36 citations. REVIEW CITATIONS

From This Paper

Topics from this paper.

References

Publications referenced by this paper.
Showing 1-5 of 5 references

Software protection Scheme

  • G J Simmons, G B Purdy, J A Studier, Wa
  • yt Proceedings of the 1982 Symposium on Security…
  • 1982

Motion, Intrusion and Tamper Detection for Surveil- lance and Containment

  • C L Henderson, A M Fine
  • Motion, Intrusion and Tamper Detection for…
  • 1980

Isecure Information Stores,!! Sandia Labora- tories Disclosure of Invention

  • R Glenn, Gustavus J Norris, Simmons
  • Isecure Information Stores,!! Sandia Labora…
  • 1965

Proceedings ~~ Eurocrypt'84

  • L Guillou, Smart Cards, Access
  • Proceedings ~~ Eurocrypt'84

The author wishes to acknowledge the contri.butiona of his colleague

  • The author wishes to acknowledge the contri…

Similar Papers

Loading similar papers…