A Peer-to-Peer Content-Distribution Scheme Resilient to Key Leakage
暂无分享,去创建一个
[1] Ki-Song Yoon,et al. DRM Enabled P2P Architecture , 2006, 2006 8th International Conference Advanced Communication Technology.
[2] Moni Naor,et al. Revocation and Tracing Schemes for Stateless Receivers , 2001, CRYPTO.
[3] Changlai Du,et al. Efficient user authentication and key management for peer-to-peer live streaming systems , 2009 .
[4] Ton Kalker,et al. A Highly Robust Audio Fingerprinting System , 2002, ISMIR.
[5] Chuang Lin,et al. EKM: An Efficient Key Management Scheme for Large-Scale Peer-to-Peer Media Streaming , 2006, PCM.
[6] Shinji Yamanaka,et al. A Peer-to-Peer Content-Distribution Scheme Resilient to Key Leakage , 2011, WISA.
[7] Juan E. Tapiador,et al. Secure content access and replication in pure P2P networks , 2008, Comput. Commun..
[8] Kiyoshi Ueda,et al. A DRM system suitable for P2P content delivery and the study on its implementation , 2003, 9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732).
[9] Zhen Chen,et al. Fingerprinting for Copyright Protection in P2P Context , 2010, 2010 International Symposium on Intelligence Information Processing and Trusted Computing.
[10] Qiaoliang Li,et al. Asymmetric fingerprinting based on 1-out-of-n oblivious transfer , 2010, IEEE Communications Letters.
[11] Diomidis Spinellis,et al. A survey of peer-to-peer content distribution technologies , 2004, CSUR.
[12] Federico Alvarez,et al. Protected seamless content delivery in P2P wireless and wired networks , 2009, IEEE Wireless Communications.
[13] Xinwen Zhang,et al. Toward digital rights protection in BitTorrent-like P2P systems , 2008, Electronic Imaging.
[14] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[15] Ingemar J. Cox,et al. A Secure, Robust Watermark for Multimedia , 1996, Information Hiding.
[16] Yoichi Shinoda,et al. StarBED and SpringOS: large-scale general purpose network testbed and supporting software , 2006, valuetools '06.