A four-layer model for security of digital rights management
暂无分享,去创建一个
[1] Eric DIEHL,et al. /spl copy/ watermark: closing the analog hole , 2003, 2003 IEEE International Conference on Consumer Electronics, 2003. ICCE..
[2] Carl A. Gunter,et al. Models and languages for digital rights , 2001, Proceedings of the 34th Annual Hawaii International Conference on System Sciences.
[3] Ingemar J. Cox,et al. Digital Watermarking and Steganography , 2014 .
[4] Renato Iannella,et al. Digital Rights Management (DRM) Architectures , 2001, D Lib Mag..
[5] Cheun Ngen Chong. Experiments in rights control : expression and enforcement , 2005 .
[6] Pramod A. Jamkhedkar,et al. DRM interoperability analysis from the perspective of a layered framework , 2005, DRM '05.
[7] Pramod A. Jamkhedkar,et al. DRM as a layered system , 2004, DRM '04.
[8] Stephen Mooney,et al. Digital Rights Management: Business and Technology , 2001 .
[9] Andrew Hutchison,et al. Persistent access control: a formal model for drm , 2007, DRM '07.
[10] Niels Rump. Definition, Aspects, and Overview , 2003, Digital Rights Management.
[11] Ivar Jacobson,et al. The Unified Modeling Language User Guide , 1998, J. Database Manag..
[12] Susanne Guth. Interoperability of DRM systems: exchanging and processing XML based rights expressions , 2006 .
[13] Title,et al. Medianet : A framework to unify different distribution channels , .
[14] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[15] Xin Wang,et al. XrML -- eXtensible rights Markup Language , 2002, XMLSEC '02.
[16] Pieter H. Hartel,et al. Comparing Logic-Based and XML-Based Rights Expression Languages , 2003, OTM Workshops.
[17] Borko Furht,et al. Multimedia Encryption and Watermarking (Multimedia Systems and Applications) , 2005 .
[18] Bart De Decker,et al. Towards a software architecture for DRM , 2005, DRM '05.
[19] Borko Furht,et al. Multimedia encryption and watermarking , 2005, Multimedia systems and applications.
[20] Dirk Günnewig,et al. Digital Rights Management , 2005, Wirtsch..
[21] Steve Mitchell,et al. The long march to interoperable digital rights management , 2004, Proceedings of the IEEE.
[22] Bruce Schneier,et al. Mod n Cryptanalysis, with Applications Against RC5P and M6 , 1999, FSE.