An Enterprise Digital Right Management Scheme with Anonymous Trust for Mobile Devices
暂无分享,去创建一个
[1] Taekyoung Kwon,et al. Efficient Key Exchange and Authentication Protocols Protecting Weak Secrets , 1998 .
[2] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[3] Li Zhao,et al. License management scheme with anonymous trust for digital rights management , 2005, 2005 IEEE International Conference on Multimedia and Expo.
[4] Reihaneh Safavi-Naini,et al. Digital Rights Management for Content Distribution , 2003, ACSW.
[5] Kazuhiro Yokoyama,et al. Elliptic curve cryptosystem , 2000 .
[6] Hung-Min Sun,et al. Password-based authentication and key distribution protocols with perfect forward secrecy , 2006, J. Comput. Syst. Sci..
[7] Chia-Chen Lin,et al. Enterprise-Oriented Digital Rights Management Mechanism: eDRM , 2009, 2009 International Conference on Availability, Reliability and Security.
[8] Chia-Chen Lin,et al. A Mobile Trading Scheme for Digital Content Based on Digital Rights , 2008, 2008 Eighth International Conference on Intelligent Systems Design and Applications.
[9] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[10] Emmanuel Bresson,et al. Mutual authentication and group key agreement for low-power mobile devices , 2003, Comput. Commun..
[11] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[12] Matu-Tarow Noda,et al. Simple and Secure Password Authentication Protocol (SAS) , 2000 .
[13] Alfred Menezes,et al. Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.
[14] Chin-Chen Chang,et al. An efficient and reliable E-DRM scheme for mobile environments , 2010, Expert Syst. Appl..
[15] Hung-Yu Chien,et al. Robust and Simple Authentication Protocol , 2003, Comput. J..
[16] Chin-Ling Chen,et al. A secure and traceable E-DRM system based on mobile device , 2008, Expert Syst. Appl..
[17] Taekyoung Kwon,et al. Authenticated key exchange protocols resistant to password guessing attacks , 1998 .