-
2
-
-
18844398553
-
-
Secure Hash Standard. FIPS 180-1, Secure Hash Standard, NIST, US Dept. of Commerce, Washington D. C. April 1995
-
Secure Hash Standard. FIPS 180-1, Secure Hash Standard, NIST, US Dept. of Commerce, Washington D. C. April 1995.
-
-
-
-
3
-
-
29244443540
-
-
xCP Cluster Protocol. http://www.almaden.ibm.com/software/ds/ContentAssurance/papers/xCP_DVB.pdf.
-
XCP Cluster Protocol
-
-
-
4
-
-
18844386455
-
-
Jan.
-
Smartright technical white paper. http://www.smartright.org/images/SMR/content/SmartRight_tech.whitepaper_jan28. pdf, Jan. 2003.
-
(2003)
Smartright Technical White Paper
-
-
-
6
-
-
0025386404
-
A logic of authentication
-
M. Burrows, M. Abadi, and R. M. Needham. A logic of authentication. ACM Trans. Comput. Syst., 8(1):18-36, 1990.
-
(1990)
ACM Trans. Comput. Syst.
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.M.3
-
7
-
-
78650035684
-
Privacy in an identity-based DRM system
-
Sept.
-
C. Conrado, F. Kamperman, G. J. Schrijen, and W. Jonker. Privacy in an Identity-based DRM System. In Proc. 14th Intl. Workshop on Database and Expert Systems Applications, pages 389-395, Sept. 2003.
-
(2003)
Proc. 14th Intl. Workshop on Database and Expert Systems Applications
, pp. 389-395
-
-
Conrado, C.1
Kamperman, F.2
Schrijen, G.J.3
Jonker, W.4
-
9
-
-
18844421556
-
-
Call for proposals for content protection & copy management technologies, July 2001
-
Call for proposals for content protection & copy management technologies, July 2001.
-
-
-
-
10
-
-
0035311789
-
An overview of multimedia content protection in consumer electronic devices
-
April
-
A. Eskicioglu and E. Delp. An overview of multimedia content protection in consumer electronic devices. Signal Processing: Image Communication, 16(5):681-699, April 2001.
-
(2001)
Signal Processing: Image Communication
, vol.16
, Issue.5
, pp. 681-699
-
-
Eskicioglu, A.1
Delp, E.2
-
11
-
-
0037399649
-
Security of digital entertainment content from creation to consumption
-
April
-
A. Eskicioglu, J. Town, and E. Delp. Security of Digital Entertainment Content from Creation to Consumption. Signal Processing: Image Communication, 18(4):237-262, April 2003.
-
(2003)
Signal Processing: Image Communication
, vol.18
, Issue.4
, pp. 237-262
-
-
Eskicioglu, A.1
Town, J.2
Delp, E.3
-
15
-
-
0003899818
-
The kerberos network authentication service (version 5)
-
IETF Network Working Group. Internet Request for Comments RFC-1510
-
J. Kohl and B. Neuman. The Kerberos Network Authentication Service (Version 5). Technical report, IETF Network Working Group, 1993. Internet Request for Comments RFC-1510.
-
(1993)
Technical Report
-
-
Kohl, J.1
Neuman, B.2
-
16
-
-
0003196107
-
RFC 2104 HMAC: Keyed-hashing for message authentication
-
Feb.
-
H. Krawczyk, M. Bellare, and R. Canetti. RFC 2104 HMAC: Keyed-Hashing for Message Authentication. Internet RFC 2104, Feb. 1997.
-
(1997)
Internet RFC
, vol.2104
-
-
Krawczyk, H.1
Bellare, M.2
Canetti, R.3
-
20
-
-
0042586782
-
Content protection in the digital home
-
M. Ripley, C. Traw, S. Balogh, and M. Reed. Content Protection in the Digital Home. Intel Technology Journal, 6(9):49-56, 2002.
-
(2002)
Intel Technology Journal
, vol.6
, Issue.9
, pp. 49-56
-
-
Ripley, M.1
Traw, C.2
Balogh, S.3
Reed, M.4
-
22
-
-
15744404712
-
Defining authorization domains using virtual devices
-
S. Sovio, N. Asokan, and K. Nyberg. Defining Authorization Domains Using Virtual Devices. In SAINT Workshops 2003, pages 331-336, 2003.
-
(2003)
SAINT Workshops 2003
, pp. 331-336
-
-
Sovio, S.1
Asokan, N.2
Nyberg, K.3
-
23
-
-
0036504654
-
An authentication logic with formal semantics supporting synchronization, revocation, and recency
-
S. G. Stubblebine and R. N. Wright. An Authentication Logic with Formal Semantics Supporting Synchronization, Revocation, and Recency. IEEE Trans. Softw. Eng., 28(3):256-285, 2002.
-
(2002)
IEEE Trans. Softw. Eng.
, vol.28
, Issue.3
, pp. 256-285
-
-
Stubblebine, S.G.1
Wright, R.N.2
-
24
-
-
18844451741
-
Secure content management in authorized domains
-
Sept.
-
S. van den Heuvel, W. Jonker, F. Kamperman, and P. Lenoir. Secure Content Management in Authorized Domains. In Proc. IBC 2002, pages 467-474, Sept. 2002.
-
(2002)
Proc. IBC 2002
, pp. 467-474
-
-
Van Den Heuvel, S.1
Jonker, W.2
Kamperman, F.3
Lenoir, P.4
|