Please use this identifier to cite or link to this item:
|Title:||Distribution of cultural content through exploitation of cryptographic algorithms and hardware identification||Authors:||Michail, Harris
|Keywords:||Block ciphers;Cultural content;Digital heritage;e-Commerce;e-Museum;Hardware identification;Hash functions;On-line Selling||Category:||Electrical Engineering - Electronic Engineering - Information Engineering||Field:||Engineering and Technology||Issue Date:||Nov-2014||Publisher:||Springer Verlag||Source:||Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) vol. 8740, 2014, pp. 156-165||Journal:||Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)||Abstract:||An influential effect of IT to museums and other Cultural Content owners organizations is the digitization of collections and in general their content. In this paper, a framework for distribution and commercialization of cultural content is proposed extending an earlier work of the authors. In this work, the framework has been upgraded to include features that protect the cultural content purchased online, to be freely distributed among users through p2p networks or file transfer or copy/paste, etc. The framework utilizes cryptographic algorithms, hash functions, block ciphers and computer’s static and unique parameters/properties. The first are used for continuous hashing and digest matching of the database’s contents for quality assurance. The block ciphers are used to enable on-line selling, through encryption of digital objects. The computer’s static and unique parameters are used to ensure the customer identity and content-distribution legibility. The system’s architecture that implements the above framework is presented and explained. This work illustrates a novel approach that utilize cryptographic and security techniques for secure distribution of Cultural Content.||ISSN:||0302-9743||DOI:||10.1007/978-3-319-13695-0||Rights:||© 2014 Springer||Type:||Article|
|Appears in Collections:||Άρθρα/Articles|
Show full item record
Page view(s) 10133
checked on Nov 17, 2019
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.