Filters








6 Hits in 3.6 sec

A Cryptanalysis of the High-Bandwidth Digital Content Protection System [chapter]

Scott Crosby, Ian Goldberg, Robert Johnson, Dawn Song, David Wagner
2002 Lecture Notes in Computer Science  
The attacks on HDCP are neither complicated nor difficult. They are basic linear algebra. Thus, there have been at least 4 independent discoveries of these flaws.  ...  --Scott Crosby (This statement is my own and does not represent the opinions of my co-authors.) [1]  ...  The weaknesses are not easy to repair.  ... 
doi:10.1007/3-540-47870-1_12 fatcat:uukt6qux3zdu3bywtvs33z67jq

Illustrative risks to the public in the use of computer systems and related technology

Peter G. Neumann
1994 Software engineering notes  
This report considers the technical implications, risks, and costs of 'key recovery', 'key escrow', and 'trusted third-party' encryption systems.  ...  analysis (R 21 62); UCITA implications as well (R 21 54); use of rot13 as "encryption" (R 21.58-59,62) Sf Very weak HDCP content protection broken -by various people (R 21 60-62) S$?  ...  rankings affected by name confusion (S 16 2) m PC EncROACHment: advice on roaches invading PCs (S 15 5) mi "My DOS ate my homework" (Blame it on the computer!)  ... 
doi:10.1145/181610.181612 fatcat:qfzxpio6tfgl5nmbevta334afi

Illustrative risks to the public in the use of computer systems and related technology

Peter G. Neumann
1992 Software engineering notes  
This report considers the technical implications, risks, and costs of 'key recovery', 'key escrow', and 'trusted third-party' encryption systems.  ...  analysis (R 21 62); UCITA implications as well (R 21 54); use of rot13 as "encryption" (R 21.58-59,62) Sf Very weak HDCP content protection broken -by various people (R 21 60-62) S$?  ...  rankings affected by name confusion (S 16 2) m PC EncROACHment: advice on roaches invading PCs (S 15 5) mi "My DOS ate my homework" (Blame it on the computer!)  ... 
doi:10.1145/134292.134293 fatcat:ayrwcbvvljhrdeav5kvrxaycs4

Illustrative risks to the public in the use of computer systems and related technology

Peter G. Neumann
1996 Software engineering notes  
This report considers the technical implications, risks, and costs of 'key recovery', 'key escrow', and 'trusted third-party' encryption systems.  ...  analysis (R 21 62); UCITA implications as well (R 21 54); use of rot13 as "encryption" (R 21.58-59,62) Sf Very weak HDCP content protection broken -by various people (R 21 60-62) S$?  ...  rankings affected by name confusion (S 16 2) m PC EncROACHment: advice on roaches invading PCs (S 15 5) mi "My DOS ate my homework" (Blame it on the computer!)  ... 
doi:10.1145/381790.381797 fatcat:kcxte3luzrg57ms3gwwbqzs5ji

Illustrative Risks To The Public In The Use Of Computer Systems And Related Technology

P.G. Neumann
Symposium Record Policy Issues in Information and Communication Technologies in Medical Applications  
This report considers the technical implications, risks, and costs of 'key recovery', 'key escrow', and 'trusted third-party' encryption systems.  ...  analysis (R 21 62); UCITA implications as well (R 21 54); use of rot13 as "encryption" (R 21.58-59,62) Sf Very weak HDCP content protection broken -by various people (R 21 60-62) S$?  ...  rankings affected by name confusion (S 16 2) m PC EncROACHment: advice on roaches invading PCs (S 15 5) mi "My DOS ate my homework" (Blame it on the computer!)  ... 
doi:10.1109/ictma.1988.669591 fatcat:wkl3mbqyjbdmfhy4wezuzx4juq

Implementing the EU Copyright Directive An advisory panel of experts provided invaluable advice and review of the guide. It was made up of About FIPR

Ville Oksanen, Rene Pfeiffer, Miguel Neves, Alceste Scalas, Helge Sorensen, Mikko, Ross Anderson, Nicholas Bohm, Simon Davies, Robin Gross, Martin Keegan, Fred Von Lohmann (+9 others)
unpublished
Acknowledgements Our thanks to the authors of the individual country reports in this guide, who provided further help and advice on other aspects of the project.  ...  The contact committee is charged with reviewing the functioning of the internal and digital markets, organising consultations on the Directive and exchanging information on relevant developments between  ...  The Copyright Act is written in generally technology-independent language, centred on the two key terms of reproduction and 'making public'.  ... 
fatcat:r574lrbjhve5daq2oa3thchw3e