By Stefan Bechtold on May 15, 2003 at 6:49 pm
Stuart Schechter et al., Trusted Computing, Peer-To-Peer Distribution, and the Conomics of Pirated Entertainment, May 2003. The paper argues that trusted computing architectures can be employed to protect P2P networks from technical and legal attacks by the entertainment industry.
Add new comment