Application of 'attack trees' technique to copyright protection protocols using watermarking and definition of a new transactions protocol secdp (secure distribution protocol)

7Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The ease and convenience that electronic commerce provides, especially when multimedia material is involved, is helping the growth in the number and volume of electronic transactions through the Internet. But this new type of trading operations has highlighted new problems related to copyright protection. Watermarking seems to be an interesting approach to solve these problems. However, watermarks by themselves do not provide enough protection, but they must be used in certain scenarios fulfilling a number of requirements. In this paper we present the results of the application of a risk analysis technique (specifically 'attack trees' technique) to the most demanding schemes developed so far, and a new protocol or business model derived from the main conclusions of this process, which we have called SecDP (Secure Distribution Protocol). © Springer-Verlag 2004.

Cite

CITATION STYLE

APA

Higuero, M. V., Unzilla, J. J., Jacob, E., Sáiz, P., & Luengo, D. (2004). Application of “attack trees” technique to copyright protection protocols using watermarking and definition of a new transactions protocol secdp (secure distribution protocol). Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3311, 264–275. https://doi.org/10.1007/978-3-540-30493-7_24

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free