Transcript
1.Register (purchase the content)
2.Request Loginid,password,file
3.Digital Receipt (token)
4.Send Token
7.Data file
5.Check for id
6.User is auth or unauth
Illegal re
quest
Poisoned chunks
Start DA & request again
Stop Piracy at the Presence of Colluders.
Pirates Detected Immediately upon First Attempt.
Protection Scheme Performs Better for Large Files.
Negligible Detection and Poisoning Overhead.
Prototyping and Benchmark Experiments Needed.
Integration of Trusted P2P System with Reputation System and DRM Scheme.