Encryption and Program Realization of Information Resources in DRM | SpringerLink
Skip to main content

Encryption and Program Realization of Information Resources in DRM

  • Conference paper
Web Information Systems – WISE 2006 Workshops (WISE 2006)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4256))

Included in the following conference series:

  • 449 Accesses

Abstract

With the development of digitizing techniques and computer network, more and more information resources are distributed and communicated by way of internet. The out-of-order nature and the uncontrolled replication of information on the internet have deprived these information resources of their copyright protection. DRM is an important means to protect the copyright of information resources, and encryption technology is the core of DRM. This paper has analyzed the principle and the main technology used by DRM in encrypting information resources; it has also conducted experiments on the programming techniques used on encrypting information resources in DRM.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. William, S.: Cryptography and Network Security: Principles and Practice, 2nd edn. (Photocopy). Tsinghua University Press, Beijing (2002)

    Google Scholar 

  2. Wang, H.: DES Methodology and the Safety Control of Digitized Information Resources. Information Science 4, 544–549 (2005)

    Google Scholar 

  3. Wu, H.: DES Data Encryption Calculation Principle and Actualization. Computer Programming Technique and Protection 3, 85–88 (2000)

    Google Scholar 

  4. Wei, X.: DES Calculation. High Performance Calculation Technique 4, 23–27 (2001)

    Google Scholar 

  5. Wu, H.: Data Encryption Proposal Based on DES Calculation and RSA Calculation. Jiao-Jor Technical School Journal (Natural Science Forum) 5, 396–397 (2002)

    Google Scholar 

  6. Tong, Xiaoyun, et al.: Research and Actualization of Encryption Technology Based on RSA Calculation. Micro-computer 6, 23–25 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chen, C., Wu, Z., Tang, L., Ran, C. (2006). Encryption and Program Realization of Information Resources in DRM. In: Feng, L., Wang, G., Zeng, C., Huang, R. (eds) Web Information Systems – WISE 2006 Workshops. WISE 2006. Lecture Notes in Computer Science, vol 4256. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11906070_25

Download citation

  • DOI: https://doi.org/10.1007/11906070_25

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-47663-4

  • Online ISBN: 978-3-540-47664-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics