Abstract
With the development of digitizing techniques and computer network, more and more information resources are distributed and communicated by way of internet. The out-of-order nature and the uncontrolled replication of information on the internet have deprived these information resources of their copyright protection. DRM is an important means to protect the copyright of information resources, and encryption technology is the core of DRM. This paper has analyzed the principle and the main technology used by DRM in encrypting information resources; it has also conducted experiments on the programming techniques used on encrypting information resources in DRM.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
William, S.: Cryptography and Network Security: Principles and Practice, 2nd edn. (Photocopy). Tsinghua University Press, Beijing (2002)
Wang, H.: DES Methodology and the Safety Control of Digitized Information Resources. Information Science 4, 544–549 (2005)
Wu, H.: DES Data Encryption Calculation Principle and Actualization. Computer Programming Technique and Protection 3, 85–88 (2000)
Wei, X.: DES Calculation. High Performance Calculation Technique 4, 23–27 (2001)
Wu, H.: Data Encryption Proposal Based on DES Calculation and RSA Calculation. Jiao-Jor Technical School Journal (Natural Science Forum) 5, 396–397 (2002)
Tong, Xiaoyun, et al.: Research and Actualization of Encryption Technology Based on RSA Calculation. Micro-computer 6, 23–25 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chen, C., Wu, Z., Tang, L., Ran, C. (2006). Encryption and Program Realization of Information Resources in DRM. In: Feng, L., Wang, G., Zeng, C., Huang, R. (eds) Web Information Systems – WISE 2006 Workshops. WISE 2006. Lecture Notes in Computer Science, vol 4256. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11906070_25
Download citation
DOI: https://doi.org/10.1007/11906070_25
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-47663-4
Online ISBN: 978-3-540-47664-1
eBook Packages: Computer ScienceComputer Science (R0)