Privacy rights management in multiparty multilevel DRM system
暂无分享,去创建一个
[1] Bülent Yener,et al. On anonymity in an electronic society: A survey of anonymous communication systems , 2009, CSUR.
[2] Zhiyong Zhang,et al. Digital Rights Management Ecosystem and its Usage Controls: A Survey , 2011 .
[3] Jie Wu,et al. Survey on anonymous communications in computer networks , 2010, Comput. Commun..
[4] George Danezis,et al. A Survey of Anonymous Communication Channels , 2008 .
[5] Mark S. Daskin,et al. Strategic facility location: A review , 1998, Eur. J. Oper. Res..
[6] Mohan S. Kankanhalli,et al. Secure multimedia content delivery with multiparty multilevel DRM architecture , 2009, NOSSDAV '09.
[7] Éva Tardos,et al. Approximation algorithms for facility location problems (extended abstract) , 1997, STOC '97.
[8] Robert H. Deng,et al. Privacy-enhanced superdistribution of layered content with trusted access control , 2006, DRM '06.
[9] Samir Khuller,et al. Greedy strikes back: improved facility location algorithms , 1998, SODA '98.
[10] Julie E. Cohen. DRM and privacy , 2003, CACM.
[11] Tony Thomas,et al. A privacy preserving content distribution mechanism for drm without trusted third parties , 2011, 2011 IEEE International Conference on Multimedia and Expo.
[12] Steve Mitchell,et al. The long march to interoperable digital rights management , 2004, Proceedings of the IEEE.
[13] Carla Merkle Westphall,et al. A DRM architecture to distribute and protect digital contents using digital licenses , 2005, Advanced Industrial Conference on Telecommunications/Service Assurance with Partial and Intermittent Resources Conference/E-Learning on Telecommunications Workshop (AICT/SAPIR/ELETE'05).
[14] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[15] Wenjun Zhang,et al. Content key acquisition protocols hiding the usage information in DRM system , 2011, 2011 IEEE 15th International Symposium on Consumer Electronics (ISCE).
[16] Mohan S. Kankanhalli,et al. Privacy Preserving Multiparty Multilevel DRM Architecture , 2009, 2009 6th IEEE Consumer Communications and Networking Conference.
[17] Michael K. Reiter,et al. Crowds: anonymity for Web transactions , 1998, TSEC.
[18] Daniel Gooch,et al. Communications of the ACM , 2011, XRDS.
[19] Sourav Mukhopadhyay,et al. Access Policy Based Key Management in Multi-level Multi-distributor DRM Architecture , 2011, InfoSecHiComNet.
[20] Seong Oun Hwang,et al. Modeling and implementation of digital rights , 2004 .
[21] Vahab S. Mirrokni,et al. The facility location problem with general cost functions , 2003, Networks.
[22] Andreas Drexl,et al. Facility location models for distribution system design , 2005, Eur. J. Oper. Res..
[23] Alvaro A. Cárdenas,et al. Towards a secure and interoperable DRM architecture , 2006, DRM '06.
[24] Radia J. Perlman,et al. Privacy-preserving DRM , 2010, IDTRUST '10.
[25] Sourav Mukhopadhyay,et al. Key management in multi-distributor based DRM system with mobile clients using IBE , 2009, 2009 Second International Conference on the Applications of Digital Information and Web Technologies.
[26] Pramod A. Jamkhedkar,et al. Digital rights management architectures , 2009, Comput. Electr. Eng..
[27] Jae-Cheol Ryou,et al. A DRM Framework for Distributing Digital Contents through the Internet , 2003 .
[28] Ming Gu,et al. Secure Anonymous Communication with Conditional Traceability , 2005, NPC.
[29] Jun Yao,et al. Privacy Preserving DRM Solution with Content Classification and Superdistribution , 2009, 2009 6th IEEE Consumer Communications and Networking Conference.