Explores the definitions, history, and applications of conditional access in media security, covering user authentication techniques, smart cards, biometrics, and legal aspects.
Explores the challenges of designing systems with untrustworthy components, emphasizing the importance of algorithmic design and analysis for systems certification.