Piracy control using secure disks

0Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

A lot of money and efforts have been invested in controlling unauthorized sharing of copyrighted contents but still the problem persists. This paper introduces a method to control and limit the disk duplication. Confidentiality and authenticity measures have been employed in this method to ensure that the disk if copied will result in an unusable and unauthentic copy. It also ensures that any attempt to tamper the contents on the disk while copying will also result in an unusable copy of the disk. The method however requires 2 constraints to be fulfilled: first, the disk will be playable on special physical drives and the disk will be made available to the authorized end user in a restricted manner. This paper also mentions that the approach being described is a generic one and different disk and disk player vendors can surely have compatibility.

Cite

CITATION STYLE

APA

Lulla, J., & Sharma, V. (2014). Piracy control using secure disks. In Communications in Computer and Information Science (Vol. 467, pp. 417–430). Springer Verlag. https://doi.org/10.1007/978-3-662-44966-0_41

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free