{"id":"https://openalex.org/W2066735065","doi":"https://doi.org/10.1109/msp.2004.1276115","title":"xCP: Peer-to-Peer content protection","display_name":"xCP: Peer-to-Peer content protection","publication_year":2004,"publication_date":"2004-03-01","ids":{"openalex":"https://openalex.org/W2066735065","doi":"https://doi.org/10.1109/msp.2004.1276115","mag":"2066735065"},"language":"en","primary_location":{"id":"doi:10.1109/msp.2004.1276115","is_oa":false,"landing_page_url":"https://doi.org/10.1109/msp.2004.1276115","pdf_url":null,"source":{"id":"https://openalex.org/S120977877","display_name":"IEEE Signal Processing Magazine","issn_l":"1053-5888","issn":["1053-5888","1558-0792"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Signal Processing Magazine","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001166006","display_name":"F. Pestoni","orcid":null},"institutions":[{"id":"https://openalex.org/I1341412227","display_name":"IBM (United States)","ror":"https://ror.org/05hh8d621","country_code":"US","type":"company","lineage":["https://openalex.org/I1341412227"]},{"id":"https://openalex.org/I4210085935","display_name":"IBM Research - Almaden","ror":"https://ror.org/005w8dd04","country_code":"US","type":"facility","lineage":["https://openalex.org/I1341412227","https://openalex.org/I4210085935","https://openalex.org/I4210114115"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"F. Pestoni","raw_affiliation_strings":["IBM Almaden","IBM Almaden Res. Center, White Plains, NY, USA"],"affiliations":[{"raw_affiliation_string":"IBM Almaden","institution_ids":["https://openalex.org/I4210085935"]},{"raw_affiliation_string":"IBM Almaden Res. Center, White Plains, NY, USA","institution_ids":["https://openalex.org/I1341412227"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113521959","display_name":"Jeffery Lotspiech","orcid":null},"institutions":[{"id":"https://openalex.org/I1341412227","display_name":"IBM (United States)","ror":"https://ror.org/05hh8d621","country_code":"US","type":"company","lineage":["https://openalex.org/I1341412227"]},{"id":"https://openalex.org/I4210085935","display_name":"IBM Research - Almaden","ror":"https://ror.org/005w8dd04","country_code":"US","type":"facility","lineage":["https://openalex.org/I1341412227","https://openalex.org/I4210085935","https://openalex.org/I4210114115"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"J.B. Lotspiech","raw_affiliation_strings":["IBM Almaden","IBM Almaden Res. Center, White Plains, NY, USA"],"affiliations":[{"raw_affiliation_string":"IBM Almaden","institution_ids":["https://openalex.org/I4210085935"]},{"raw_affiliation_string":"IBM Almaden Res. Center, White Plains, NY, USA","institution_ids":["https://openalex.org/I1341412227"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055467471","display_name":"Stefan Nusser","orcid":null},"institutions":[{"id":"https://openalex.org/I4210087817","display_name":"Software (Germany)","ror":"https://ror.org/004g36n56","country_code":"DE","type":"company","lineage":["https://openalex.org/I4210087817"]},{"id":"https://openalex.org/I1341412227","display_name":"IBM (United States)","ror":"https://ror.org/05hh8d621","country_code":"US","type":"company","lineage":["https://openalex.org/I1341412227"]}],"countries":["DE","US"],"is_corresponding":false,"raw_author_name":"S. Nusser","raw_affiliation_strings":["IBMs Software Group","[IBMs Software Group]"],"affiliations":[{"raw_affiliation_string":"IBMs Software Group","institution_ids":[]},{"raw_affiliation_string":"[IBMs Software Group]","institution_ids":["https://openalex.org/I1341412227","https://openalex.org/I4210087817"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5001166006"],"corresponding_institution_ids":["https://openalex.org/I1341412227","https://openalex.org/I4210085935"],"apc_list":null,"apc_paid":null,"fwci":7.1953,"has_fulltext":false,"cited_by_count":28,"citation_normalized_percentile":{"value":0.96869468,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":"21","issue":"2","first_page":"71","last_page":"81"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7748907804489136},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6927562952041626},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6698285937309265},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.6584968566894531},{"id":"https://openalex.org/keywords/peer-to-peer","display_name":"Peer-to-peer","score":0.6045847535133362},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5778282880783081},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5547102689743042},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.5149967670440674},{"id":"https://openalex.org/keywords/broadcast-encryption","display_name":"Broadcast encryption","score":0.48427337408065796},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.41985398530960083},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.4111769199371338}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7748907804489136},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6927562952041626},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6698285937309265},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.6584968566894531},{"id":"https://openalex.org/C534932454","wikidata":"https://www.wikidata.org/wiki/Q161410","display_name":"Peer-to-peer","level":2,"score":0.6045847535133362},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5778282880783081},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5547102689743042},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.5149967670440674},{"id":"https://openalex.org/C2778281673","wikidata":"https://www.wikidata.org/wiki/Q4972106","display_name":"Broadcast encryption","level":4,"score":0.48427337408065796},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.41985398530960083},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.4111769199371338},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/msp.2004.1276115","is_oa":false,"landing_page_url":"https://doi.org/10.1109/msp.2004.1276115","pdf_url":null,"source":{"id":"https://openalex.org/S120977877","display_name":"IEEE Signal Processing Magazine","issn_l":"1053-5888","issn":["1053-5888","1558-0792"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Signal Processing Magazine","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":4,"referenced_works":["https://openalex.org/W2125079354","https://openalex.org/W2168571148","https://openalex.org/W4238634196","https://openalex.org/W6609405457"],"related_works":["https://openalex.org/W2289378658","https://openalex.org/W1531360494","https://openalex.org/W2093529019","https://openalex.org/W87530933","https://openalex.org/W154233216","https://openalex.org/W2626486901","https://openalex.org/W2026856585","https://openalex.org/W1988007309","https://openalex.org/W767161385","https://openalex.org/W2991189023"],"abstract_inverted_index":{"In":[0],"this":[1,100],"article,":[2],"we":[3],"present":[4],"a":[5,13,26,35,51,62,70,79],"new":[6,27],"protocol":[7,49,81],"for":[8,29,93,111],"implementing":[9],"an":[10],"authorized":[11,20],"domain,":[12],"collection":[14],"of":[15,43,54,78,99],"devices":[16],"that":[17,33,64,86],"are":[18,115],"equally":[19],"to":[21],"play":[22],"content.":[23],"This":[24],"is":[25,50],"direction":[28],"content":[30,46,91],"protection":[31,92],"schemes":[32],"represents":[34],"careful":[36],"balance":[37],"between":[38],"the":[39,76],"needs":[40],"and":[41,45,88,109],"wants":[42],"consumers":[44],"owners.":[47],"Our":[48],"novel":[52],"application":[53],"cryptographic":[55],"technique":[56],"known":[57],"as":[58],"broadcast":[59,84],"encryption":[60,85],"in":[61],"configuration":[63],"had":[65],"not":[66],"been":[67],"explored":[68],"previously:":[69],"peer-to-peer":[71],"(P2P)":[72],"network.":[73],"We":[74],"discuss":[75],"details":[77],"P2P":[80],"based":[82],"on":[83],"supports":[87],"enforces":[89],"renewable":[90],"home":[94],"networks.":[95],"Several":[96],"technical":[97],"advantages":[98],"protocol,":[101],"including":[102],"lower":[103],"computational":[104],"requirements,":[105],"flexible":[106],"network":[107],"topology":[108],"support":[110],"intermittently":[112],"connected":[113],"devices,":[114],"given.":[116]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
