Source:http://linkedlifedata.com/resource/pubmed/id/17582958
Switch to
Predicate | Object |
---|---|
rdf:type | |
lifeskim:mentions | |
pubmed:issue |
3
|
pubmed:dateCreated |
2007-6-22
|
pubmed:abstractText |
That quenches my immediate thirst for researching cryptography. You can see how quickly these methods can get complicated. I don't know, and based on DMCA maybe I don't want to know, how encryption is used in DRM. We know that it includes encryption techniques to protect content from being copied and to control ultimate usage of the content. As with just about any technology, there are good and not so good uses. DRM is just another example. We barely touched the surface of the world of cryptography--you can find so much more with simple internet searches. I've included several of the encryption techniques I came across in the glossary to whet your appetite for more (see www.aami.org/ publications/bit). Remember, the key to encryption is the key to encryption!
|
pubmed:language |
eng
|
pubmed:journal | |
pubmed:citationSubset |
IM
|
pubmed:status |
MEDLINE
|
pubmed:issn |
0899-8205
|
pubmed:author | |
pubmed:issnType |
Print
|
pubmed:volume |
41
|
pubmed:owner |
NLM
|
pubmed:authorsComplete |
Y
|
pubmed:pagination |
222-6
|
pubmed:meshHeading | |
pubmed:articleTitle |
DRM: tales from the crypt(ography).
|
pubmed:affiliation |
GE Healthcare, Waukesha, WI, USA. Jeff.Kabachinski@ge.com
|
pubmed:publicationType |
Journal Article
|