Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Gregory M. Perkins is active.

Publication


Featured researches published by Gregory M. Perkins.


international conference on multimedia and expo | 2002

k-time encryption for k-time licensing

Gregory M. Perkins; Prabir Bhattacharya

We introduce the notion of a k-time license for digital content and a method for ensuring its security via a k-time encryption scheme. A k-times license is an agreement that legally allows the purchaser to use the licensed material at most k times. The digital content is only accessible through a provided application that decrypts and re-encrypts the content according to our k-time encryption scheme. The application must use secret keys during this process, a vulnerability since the application resides on the users PC or electronic device. To help heighten the level of security of our system, we also introduce the idea of hiding secret keys in the heuristic solutions of NP-hard problems and then further extend the security with some other well known methods.


Archive | 2005

Using hardware to secure areas of long term storage in CE devices

Gregory M. Perkins; David Alan Braun


Archive | 2006

System and Method for Service Discovery in a Computer Network Using Dynamic Proxy and Data Dissemination

John Buford; Emre Celebi; Phyllis Frankl; Keith Ross; Gregory M. Perkins


Archive | 2001

Encryption scheme for limiting the maximum number of accesses to a digital file of predetermined content

Prabir Bhattacharya; Gregory M. Perkins


Archive | 2004

Software defined radio download

David Alan Braun; Gregory M. Perkins


Archive | 2001

Method for calculating arithmetic inverse over finite fields for use in cryptography

Laszlo Hars; Gregory M. Perkins


Archive | 2005

Cryptographic system for resource starved CE device secure upgrade and re-configuration

David Alan Braun; Gregory M. Perkins


IEEE Transactions on Consumer Electronics | 2003

An encryption scheme for limited k-time access to digital media

Gregory M. Perkins; Prabir Bhattacharya


Archive | 2001

Efficient greatest common divisor algorithm using multiprecision arithmetic

Gregory M. Perkins


Archive | 2006

Method for secure packet identification

Gregory M. Perkins; Sathya Narayanan

Collaboration


Dive into the Gregory M. Perkins's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge