Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request

Multicast sigurnost i zaštita autorskih prava ; Multicast Security And Copyright Protection

Item request has been placed! ×
Item request cannot be made. ×
loading   Processing Request
  • Additional Information
    • Contributors:
      Matić, Ivan
    • Publication Information:
      Sveučilište Josipa Jurja Strossmayera u Osijeku. Fakultet primijenjene matematike i informatike.
      Josip Juraj Strossmayer University of Osijek. School of Applied Mathematics and Informatics.
    • Publication Date:
      2023
    • Collection:
      Croatian Digital Theses Repository (National and University Library in Zagreb)
    • Abstract:
      U ovom radu upoznali smo se s pojmom multicast te predstavili neke od načina kako osigurati sigurnost prilikom višesmjernog odašiljanja. Razmotrili smo BES algoritam i generalizirani BES algoritam kao potencijalne načine osiguravanja sigurnosti enkriptiranjem odašiljanja. Kao drugu opciju zaštite naveli smo proces ponovnog generiranja ključa u vidu kojeg smo opisali Blacklisting shemu, Naor-Pinkas shemu te shemu hijerarhije ključeva. U drugom dijelu rada naglasak je stavljen na zaštitu autorskih prava i praćenje ilegalno distribuiranog sadržaja kroz problem otiska prsta te identificiranje familije korisnika koja pokušava ilegalno doći do sadržaja. Rad smo potkrijepili konkretnim primjerima provedbe navedenih algoritama i shema. ; In this paper, we were introduced to the term multicast and presented some of the ways to ensure security during multicast transmission. We considered the BES algorithm and the generalized BES algorithm as potential ways to ensure security by encrypting transmissions. As another protection option, we have listed the process of re-generating the key in the form of which we have described the Blacklisting scheme, the Naor-Pinkas scheme and the key hierarchy scheme. In the second part of the paper, the emphasis is on the copyrights protection and the tracing of illegally distributed content through the problem of fingerprinting and identifying the family of users who are trying to access the content illegally. We supported the work with concrete examples of application of the mentioned algorithms and schemes.
    • File Description:
      application/pdf
    • Relation:
      https://zir.nsk.hr/islandora/object/mathos:815; https://urn.nsk.hr/urn:nbn:hr:126:907118; https://repozitorij.unios.hr/islandora/object/mathos:815; https://repozitorij.unios.hr/islandora/object/mathos:815/datastream/PDF
    • Online Access:
      https://zir.nsk.hr/islandora/object/mathos:815
      https://urn.nsk.hr/urn:nbn:hr:126:907118
      https://repozitorij.unios.hr/islandora/object/mathos:815
      https://repozitorij.unios.hr/islandora/object/mathos:815/datastream/PDF
    • Rights:
      http://rightsstatements.org/vocab/InC/1.0/ ; info:eu-repo/semantics/openAccess
    • Accession Number:
      edsbas.F6C041D9