Proceedings of the IEEE

Issue 6 • June 2004

Filter Results

Displaying Results 1 - 19 of 19
  • [Front cover]

    Publication Year: 2004, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (149 KB)
    Freely Available from IEEE
  • IEEE Member Digital Library [advertisement]

    Publication Year: 2004, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (261 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2004, Page(s): 877
    Request permission for commercial reuse | PDF file iconPDF (49 KB)
    Freely Available from IEEE
  • Proceedings of the IEEE publication information

    Publication Year: 2004, Page(s): 878
    Request permission for commercial reuse | PDF file iconPDF (37 KB)
    Freely Available from IEEE
  • Special Issue on Enabling Security Technologies for Digital Rights Management

    Publication Year: 2004, Page(s):879 - 882
    Cited by:  Papers (8)
    Request permission for commercial reuse | PDF file iconPDF (120 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The long march to interoperable digital rights management

    Publication Year: 2004, Page(s):883 - 897
    Cited by:  Papers (56)  |  Patents (70)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (376 KB) | HTML iconHTML

    This paper discusses interoperability of digital rights management (DRM) systems. We start by describing a basic reference model for DRM. The cause of interoperability is served by understanding and circumscribing what DRM is "in the whole." Then we outline and contrast three different approaches to achieving interoperability. One approach relies on flexible network services to provide functionali... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Anonymous trust: digital rights management using broadcast encryption

    Publication Year: 2004, Page(s):898 - 909
    Cited by:  Papers (24)  |  Patents (50)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (600 KB) | HTML iconHTML

    Broadcast encryption is an active area of cryptographic research. Originally defined by Fiat and Naor, broadcast encryption refers to key management schemes that operate when the participating parties do not have a two-way communication path. We contrast that with public-key cryptography: all known public-key protocols require a handshake to establish a common key. We extend the use of broadcast e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient state updates for key management

    Publication Year: 2004, Page(s):910 - 917
    Cited by:  Papers (8)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB) | HTML iconHTML

    Encryption is widely used to enforce usage rules for digital content. In many scenarios content is encrypted using a group key which is known to a group of users that are allowed to use the content. When users leave or join the group, the group key must be changed. The logical key hierarchy (LKH) algorithm is a very common method of managing these key changes. In this algorithm every user keeps a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Video fingerprinting and encryption principles for digital rights management

    Publication Year: 2004, Page(s):918 - 932
    Cited by:  Papers (115)  |  Patents (29)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (368 KB) | HTML iconHTML

    This paper provides a tutorial and survey of digital fingerprinting and video scrambling algorithms based on partial encryption. Necessary design tradeoffs for algorithm development are highlighted for multicast communication environments. We also propose a novel architecture for joint fingerprinting and decryption that holds promise for a better compromise between practicality and security for em... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New approaches to digital evidence

    Publication Year: 2004, Page(s):933 - 947
    Cited by:  Papers (17)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB) | HTML iconHTML

    Digital evidence, such as digital signatures, is of crucial importance in the emerging digitally operating economy because it is easy to transmit, archive, search, and verify. Nevertheless, the initial promise of the usefulness of digital signatures was too optimistic. This calls for a systematic treatment of digital evidence. The paper provides a foundation for reasoning about digital evidence sy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Biometric cryptosystems: issues and challenges

    Publication Year: 2004, Page(s):948 - 960
    Cited by:  Papers (303)  |  Patents (22)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (512 KB) | HTML iconHTML

    In traditional cryptosystems, user authentication is based on possession of secret keys; the method falls apart if the keys are not kept secret (i.e., shared with non-legitimate users). Further, keys can be forgotten, lost, or stolen and, thus, cannot provide non-repudiation. Current authentication systems based on physiological and behavioral characteristics of persons (known as biometrics), such... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Music2Share - copyright-compliant music sharing in P2P systems

    Publication Year: 2004, Page(s):961 - 970
    Cited by:  Papers (22)  |  Patents (23)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB) | HTML iconHTML

    Peer-to-peer (P2P) networks are generally considered to be free havens for pirated content, in particular with respect to music. We describe a solution for the problem of copyright infringement in P2P networks for music sharing. In particular, we propose a P2P protocol that integrates the functions of identification, tracking, and sharing of music with those of licensing, monitoring, and payment. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Benchmarking of image watermarking algorithms for digital rights management

    Publication Year: 2004, Page(s):971 - 984
    Cited by:  Papers (39)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (416 KB) | HTML iconHTML

    We discuss the issues related to image watermarking benchmarking and scenarios based on digital rights management requirements. We show that improvements are needed in image quality evaluation, especially related to image geometrical deformation assessments, in risk evaluation related to specific delivery scenarios and in multidimensional criteria evaluation. Efficient benchmarking is still an ope... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The technical and legal dangers of code-based fair use enforcement

    Publication Year: 2004, Page(s):985 - 996
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB) | HTML iconHTML

    Digital rights management (DRM) mechanisms, built upon trusted computing platforms, promise to give content providers the ability to impose rules reliably and deterministically on end-user experiences with information resources ranging from literary works and scholarly publications to a vast array of entertainment content. DRM represents just the first wave of a class of technologies that aspire n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Legal policy and digital rights management

    Publication Year: 2004, Page(s):997 - 1003
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (120 KB) | HTML iconHTML

    The paper, intended primarily to be a tutorial, informs readers of the important role that law and policy play in the development of new technologies. It also provides guidance with respect to the legal and policy issues that apply to digital rights management (DRM) techniques. The laws and policies that affect the development of DRM architectures are explained. The trends that affect the way inte... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scanning our past from The Netherlands: early galactic radio astronomy at Kootwijk and some consequential developments

    Publication Year: 2004, Page(s):1004 - 1006
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (210 KB) | HTML iconHTML

    During World War II, Prof. Dr J.H. Oort, the famous Dutch astronomer and discoverer of the origin of our comets, was living in the countryside of The Netherlands. At that time, it was an occupied country. He decided one day to ride his bicycle to visit the observatory at Leiden University, which in fact had been closed for some time. Halfway on this 120 km trip to Leiden, which is near the North S... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Future Special Issues/Special Sections of the IEEE Proceedings

    Publication Year: 2004, Page(s):1007 - 1008
    Request permission for commercial reuse | PDF file iconPDF (25 KB)
    Freely Available from IEEE
  • Celebrating the vitality of technology the Proceedings of the IEEE [advertisement]

    Publication Year: 2004, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (144 KB)
    Freely Available from IEEE
  • Proceedings of the IEEE check out our July issue

    Publication Year: 2004, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (370 KB)
    Freely Available from IEEE

Aims & Scope

The most highly-cited general interest journal in electrical engineering and computer science, the Proceedings is the best way to stay informed on an exemplary range of topics.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
H. Joel Trussell
North Carolina State University