Secure and ubiquitous authenticated content distribution framework for IoT enabled DRM system
暂无分享,去创建一个
[1] Andrew S. Tanenbaum,et al. A DRM security architecture for home networks , 2004, DRM '04.
[2] Maurizio Tomasella,et al. Vision and Challenges for Realising the Internet of Things , 2010 .
[3] B. B. Gupta,et al. Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags , 2017, The Journal of Supercomputing.
[4] Mauro Conti,et al. Provably Secure Authenticated Key Agreement Scheme for Smart Grid , 2018, IEEE Transactions on Smart Grid.
[5] Yu-Yi Chen,et al. A Fair-Use DRM System Based on Web Service , 2008, 2008 Eighth International Conference on Intelligent Systems Design and Applications.
[6] Chin-Ling Chen,et al. A secure and traceable E-DRM system based on mobile device , 2008, Expert Syst. Appl..
[7] Vanga Odelu,et al. An efficient ECC-based privacy-preserving client authentication protocol with key agreement using smart card , 2015, J. Inf. Secur. Appl..
[8] Sebastian Mödersheim,et al. The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications , 2005, CAV.
[9] Mihir Bellare,et al. Authenticated Key Exchange Secure against Dictionary Attacks , 2000, EUROCRYPT.
[10] Cheng-Chi Lee,et al. A Hash Based Remote User Authentication and Authenticated Key Agreement Scheme for the Integrated EPR Information System , 2015, Journal of Medical Systems.
[11] Chin-Chen Chang,et al. An efficient and reliable E-DRM scheme for mobile environments , 2010, Expert Syst. Appl..
[12] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[13] Wei-Bin Lee,et al. A Portable DRM Scheme Using Smart Cards , 2007, J. Organ. Comput. Electron. Commer..
[14] Lei Yang,et al. A DRM Authentication Scheme Based on Smart-Card , 2009, 2009 International Conference on Computational Intelligence and Security.
[15] Cheng-Chi Lee,et al. A Biometric-Based Authentication and Anonymity Scheme for Digital Rights Management System , 2018, Inf. Technol. Control..
[16] Chin-Chen Chang,et al. A practical secure and efficient enterprise digital rights management mechanism suitable for mobile environment , 2013, Secur. Commun. Networks.
[17] In Lee,et al. The Internet of Things (IoT): Applications, investments, and challenges for enterprises , 2015 .
[18] Artemis Moroni,et al. Vision and Challenges for Realising the Internet of Things , 2010 .
[19] Kevin Ashton,et al. That ‘Internet of Things’ Thing , 1999 .
[20] Willem Jonker,et al. Privacy in an identity-based DRM system , 2003, 14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings..
[21] Sourav Mukhopadhyay,et al. An anonymous and secure biometric-based enterprise digital rights management system for mobile environment , 2015, Secur. Commun. Networks.
[22] Wei-Bin Lee,et al. A novel DRM scheme for accommodating expectations of personal use , 2018, Multimedia Tools and Applications.
[23] Qingqi Pei,et al. A Novel Digital Content Protection System Based on Iris Biometric , 2007, Fourth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 2007).
[24] Guangyi Xiao,et al. User Interoperability With Heterogeneous IoT Devices Through Transformation , 2014, IEEE Transactions on Industrial Informatics.
[25] Weisong Shi,et al. Edge Computing: Vision and Challenges , 2016, IEEE Internet of Things Journal.
[26] Hyoungshick Kim. Scalable DRM System for Media Portability , 2007, ASIAN.
[27] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[28] Chunxiao Wang,et al. Full secure identity-based encryption scheme over lattices for wireless sensor networks in the standard model , 2018, Int. J. High Perform. Comput. Netw..
[29] B. B. Gupta,et al. A lightweight mutual authentication protocol based on elliptic curve cryptography for IoT devices , 2017, Int. J. Adv. Intell. Paradigms.
[30] Dongwoo Kang,et al. An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System , 2017, PloS one.
[31] N. Asokan,et al. Defining authorization domains using virtual devices , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[32] Cheng-Chi Lee,et al. An improved E-DRM scheme for mobile environments , 2018, J. Inf. Secur. Appl..