Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Device Keys

Device Keys play a roles in the cryptographic key management procedure in the Advanced Access Content System (AACS) specification. This specification… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
The Internet of Things (IoT) is growing at a rapid pace. With everyday applications and services becoming wirelessly networked… Expand
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 5
Is this relevant?
2018
2018
We present DECIM, an approach to solve the challenge of detecting endpoint compromise in messaging. DECIM manages and refreshes… Expand
  • figure 1
  • figure 2
  • figure 3
  • table I
  • table II
Is this relevant?
2015
2015
Encryption is useful only if the decryption key has not been exposed to adversaries; in particular, it requires that the device… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • table 1
Is this relevant?
2013
2013
The present invention discloses a device authentication using a physically unclonable function based key generation system. At… Expand
Is this relevant?
2011
2011
The advanced access content system is a standard for content distribution and digital rights management.It revokes compromised… Expand
Is this relevant?
2008
2008
The present contribution introduces a new way for solving the issue of security for payments over the internet. It particularly… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2008
2008
PURPOSE: A method of tracing device keys for a broadcast encryption is provided to prevent exposure of a device key through… Expand
Is this relevant?
Review
2004
Review
2004
CSS, the first system to protect multimedia content on the new DVD medium failed badly, because both its encryption algorithm and… Expand
  • figure 1
  • figure 5
  • figure 4
  • figure 3
  • figure 7
Is this relevant?
2001
2001
We describe a weakness in the High Bandwidth Digital Content Protection (HDCP) scheme which may lead to practical attacks. HDCPi… Expand
  • table 1
  • table 2
Is this relevant?
1996
1996
This device comprises a curved keypad with a certain profile, comprising: on the outside, keys (6c, 6f and 6i) to be handled by… Expand
Is this relevant?