Digital Rights Management - Current Status and Future Trends
暂无分享,去创建一个
[1] Ronald Petrlic,et al. Towards practical privacy-preserving digital rights management for cloud computing , 2013, 2013 IEEE 10th Consumer Communications and Networking Conference (CCNC).
[2] Ronald Petrlic,et al. Unlinkable content playbacks in a multiparty DRM system , 2013, DBSec.
[3] Yixian Yang,et al. Secure and privacy-preserving DRM scheme using homomorphic encryption in cloud computing , 2013 .
[4] Mohan S. Kankanhalli,et al. Privacy Preserving Multiparty Multilevel DRM Architecture , 2009, 2009 6th IEEE Consumer Communications and Networking Conference.
[5] Yixian Yang,et al. Attribute Based DRM Scheme with Efficient Revocation in Cloud Computing , 2013, J. Comput..
[6] Jianmin Wang,et al. A cloud based SIM DRM scheme for the mobile internet , 2010, CCS '10.
[7] S. Mukhopadhyay,et al. Privacy preserving hierarchical content distribution in multiparty multilevel DRM , 2012, 2012 World Congress on Information and Communication Technologies.
[8] Zhiguang Qin,et al. Anonymous Pairing-Free and Certificateless Key Exchange Protocol for DRM System , 2016, Int. J. Netw. Secur..
[9] Radia J. Perlman,et al. Privacy-preserving DRM , 2010, IDTRUST '10.
[10] Huang Qinlong,et al. Attribute based DRM scheme with dynamic usage control in cloud computing , 2014, China Communications.
[11] Kim Seung-Hyun,et al. Accountable privacy based on publicly verifiable secret sharing , 2010, 2010 The 12th International Conference on Advanced Communication Technology (ICACT).
[12] David Chaum,et al. Wallet Databases with Observers , 1992, CRYPTO.
[13] Ronald Petrlic,et al. Proxy Re-encryption in a Privacy-Preserving Cloud Computing DRM Scheme , 2012, CSS.
[14] Sourav Mukhopadhyay,et al. A Certificateless Authenticated Key Agreement Protocol for Digital Rights Management System , 2013, QSHINE.
[15] Matthew Green,et al. Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.
[16] Hung-Wen Yang,et al. Identity-Based DRM in Ubiquitous Multimedia System , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[17] Tony Thomas,et al. Privacy Enabled Digital Rights Management Without Trusted Third Party Assumption , 2012, IEEE Transactions on Multimedia.
[18] Willem Jonker,et al. Privacy-Preserving Digital Rights Management , 2004, Secure Data Management.
[19] Yang Yi-xian,et al. Secure DRM Scheme Supporting Dynamic Authorization Using Attribute-Based Encryption , 2014 .
[20] Yong Wang,et al. A new usage control protocol for data protection of cloud environment , 2016, EURASIP J. Inf. Secur..
[21] Stefan Katzenbeisser,et al. A New DRM Architecture with Strong Enforcement , 2010, 2010 International Conference on Availability, Reliability and Security.
[22] Yixian Yang,et al. Attribute based DRM scheme with dynamic usage control in cloud computing , 2014 .
[23] Brent Waters,et al. Functional Encryption for Regular Languages , 2012, CRYPTO.
[24] Jianhua Chen,et al. An efficient certificateless designated verifier signature scheme , 2013, Int. Arab J. Inf. Technol..