A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Nuovo DRM Paradiso: Towards a Verified Fair DRM Scheme
[chapter]
Lecture Notes in Computer Science
A finite model of the extended scheme is subsequently model checked and shown to satisfy its design requirements, including secrecy, fairness and resisting content masquerading. ...
The security requirements of the scheme are formalized and using them as the basis, the scheme is verified. ...
Formal analysis In this section we describe the steps followed to formally verify that Nuovo DRM achieves its design goals. ...
doi:10.1007/978-3-540-75698-9_3
dblp:conf/fsen/DashtiNJ07
fatcat:n6pis6er5nelte3avl2kx6sfsi
Security matters:privacy in voting and fairness in digital exchange
[article]
2009
We design a new system, Nuovo DRM to address these flaws and provide fair exchange. ...
Hence, Nuovo DRM provides a secure DRM scheme which encompasses content redistribution. ...
Nuovo DRM resists content masquerading attacks in S 1 , ensuring that a compliant device only receives the content which it has requested. ...
doi:10.6100/ir643467
fatcat:vlcfc6brhvbzji4lwq5tlj43ie
La privacy by design: un'analisi comparata nell'era digitale
[article]
2017
security by design. ...
We propose to use a two-step authentication scheme using a mobile communication device, eg, a smart phone or tablet. ...
of a product, program or service and (2) Maintaining appropriate management processes and practices throughout the data lifecycle that are designed to ensure that information systems comply with: (A) ...
doi:10.15168/11572_177733
fatcat:nf4mt7uyz5asxegdagtrpgg7om