Device Keys

Device Keys play a roles in the cryptographic key management procedure in the Advanced Access Content System (AACS) specification. This specification… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2004-2018
01220042018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
We present DECIM, an approach to solve the challenge of detecting endpoint compromise in messaging. DECIM manages and refreshes… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2016
2016
Cryptosystems rely on the assumption that the computer end-points can securely store and use cryptographic keys. Yet, this… (More)
  • table 3.1
  • table 3.2
  • table 4.1
  • figure 4.1
  • figure 4.2
Is this relevant?
2015
2015
Encryption is useful only if the decryption key has not been exposed to adversaries; in particular, it requires that the device… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • table 1
Is this relevant?
2012
2012
This paper presents an easy to design Physically Unclonable Function (PUF). The proposed PUF implementation is a loop composed of… (More)
  • figure 3
  • figure 2
  • table I
  • figure 6
  • figure 7
Is this relevant?
2008
2008
The present contribution introduces a new way for solving the issue of security for payments over the internet. It particularly… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2008
2008
Body area network (BAN) is an emerging technology which receives significant interest recent years. Typical BAN applications… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table I
Is this relevant?
2005
2005
Minimizing information leakage is a crucial problem in DRM software development processes, where security information (e.g… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • table 2
Is this relevant?
Review
2004
Review
2004
CSS, the first system to protect multimedia content on the new DVD medium failed badly, because both its encryption algorithm and… (More)
  • figure 1
  • figure 3
  • figure 5
  • figure 4
  • figure 7
Is this relevant?