Statements in which the resource exists as a subject.
PredicateObject
rdf:type
lifeskim:mentions
pubmed:issue
3
pubmed:dateCreated
2007-6-22
pubmed:abstractText
That quenches my immediate thirst for researching cryptography. You can see how quickly these methods can get complicated. I don't know, and based on DMCA maybe I don't want to know, how encryption is used in DRM. We know that it includes encryption techniques to protect content from being copied and to control ultimate usage of the content. As with just about any technology, there are good and not so good uses. DRM is just another example. We barely touched the surface of the world of cryptography--you can find so much more with simple internet searches. I've included several of the encryption techniques I came across in the glossary to whet your appetite for more (see www.aami.org/ publications/bit). Remember, the key to encryption is the key to encryption!
pubmed:language
eng
pubmed:journal
pubmed:citationSubset
IM
pubmed:status
MEDLINE
pubmed:issn
0899-8205
pubmed:author
pubmed:issnType
Print
pubmed:volume
41
pubmed:owner
NLM
pubmed:authorsComplete
Y
pubmed:pagination
222-6
pubmed:meshHeading
pubmed:articleTitle
DRM: tales from the crypt(ography).
pubmed:affiliation
GE Healthcare, Waukesha, WI, USA. Jeff.Kabachinski@ge.com
pubmed:publicationType
Journal Article