Thread Rating:
  • 1 Vote(s) - 4 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Post: #1

Optical discs are the preferred media for storing and distributing digital information, especially software. The pervasive use of these discs in motivated by their low cost coupled with their versatility and durability. But advances in circuit technology have also boosted software piracy by making it easy to create high-fidelity copies of optical discs. Thor is a security scheme that aims to prevent unauthorized disc duplication and any illegal use of the data. Thor relies on a combination of software and hardware strategies using time-tested cryptographic algorithms to provide resistance to tampering and malicious operations. Currently, Thor exists only as a research proposal, not as a working prototype of a security mechanism. But a survey of available technologies suggests that implementing Thor is feasible.Thor presents a possible a new direction in the battle against piracy. Its acceptability, and the consequent realization of this concept, depends on how determined manufacturers are to defeat digital theft. A determined pirate can break most security mechanisms. But this proposal aims to discourage piracy by offering an innovative security technique.
Post: #2
ppt where
Post: #3
sir plzz send me the ppt of optical disc data security.
my email is
Post: #4
ppt of optical disk data security
Post: #5
to get information about the topic data security full report ,ppt and related topic refer the link bellow

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: vasco data security, austin disc, details of optical disc data security using thor, optical disc corporation, data security ehr, optical disc data security seminar abstract, belmont disc golf,

Quick Reply
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  Optical Computer Full Seminar Report Download computer science crazy 43 34,284 29-04-2016 09:16 AM
Last Post: dhanyavp
  Data Encryption Standard (DES) seminar class 2 1,844 20-02-2016 01:59 PM
Last Post: seminar report asees
  Skin Tone based Secret Data hiding in Images seminar class 9 5,558 23-12-2015 04:18 PM
Last Post: HelloGFS
  HOLOGRAPHIC VERSATILE DISC A SEMINAR REPORT Computer Science Clay 20 28,458 16-09-2015 02:18 PM
Last Post: seminar report asees
Brick XML Data Compression computer science crazy 2 1,497 07-10-2014 09:26 PM
Last Post: seminar report asees
  Bluetooth Security Full Download Seminar Report and Paper Presentation computer science crazy 21 17,231 07-08-2014 11:32 PM
Last Post: [email protected]
  Data Security in Local Network using Distributed Firewalls computer science crazy 10 6,691 30-03-2014 04:40 AM
Last Post: Guest
  GREEN CLOUD -A Data Center Approach computer topic 0 663 25-03-2014 10:13 PM
Last Post: computer topic
  3D-OPTICAL DATA STORAGE TECHNOLOGY computer science crazy 3 7,072 12-09-2013 08:28 PM
Last Post: Guest
  Security in Data Warehousing seminar surveyer 3 2,365 12-08-2013 10:24 AM
Last Post: computer topic