January 1, 2001
Author(s)
William E. Burr
… note, at least for large scale, controlled distribution of digital content to millions of consumers or subscribers. The … protocol (an attacker is a third party), but in Digital Rights Management (DRM) applications the consumer who … evolving business models, all of which are driven by new digital technologies. …