메뉴 건너뛰기




Volumn , Issue , 2004, Pages 1-10

A DRM security architecture for home networks

Author keywords

Compliant CE Devices; Digital Content Protection; DRM Architectures

Indexed keywords

ALGORITHMS; COMPUTER ARCHITECTURE; COMPUTER HARDWARE; CONSUMER ELECTRONICS; CRYPTOGRAPHY; DATA STORAGE EQUIPMENT; HAND HELD COMPUTERS; MATHEMATICAL MODELS; NETWORK PROTOCOLS; PERSONAL DIGITAL ASSISTANTS; REGULATORY COMPLIANCE; SECURITY OF DATA; SECURITY SYSTEMS; VIDEODISKS;

EID: 18844410277     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1029146.1029150     Document Type: Conference Paper
Times cited : (77)

References (25)
  • 2
    • 18844398553 scopus 로고    scopus 로고
    • Secure Hash Standard. FIPS 180-1, Secure Hash Standard, NIST, US Dept. of Commerce, Washington D. C. April 1995
    • Secure Hash Standard. FIPS 180-1, Secure Hash Standard, NIST, US Dept. of Commerce, Washington D. C. April 1995.
  • 3
    • 29244443540 scopus 로고    scopus 로고
    • xCP Cluster Protocol. http://www.almaden.ibm.com/software/ds/ContentAssurance/papers/xCP_DVB.pdf.
    • XCP Cluster Protocol
  • 4
    • 18844386455 scopus 로고    scopus 로고
    • Jan.
    • Smartright technical white paper. http://www.smartright.org/images/SMR/content/SmartRight_tech.whitepaper_jan28. pdf, Jan. 2003.
    • (2003) Smartright Technical White Paper
  • 9
    • 18844421556 scopus 로고    scopus 로고
    • Call for proposals for content protection & copy management technologies, July 2001
    • Call for proposals for content protection & copy management technologies, July 2001.
  • 10
    • 0035311789 scopus 로고    scopus 로고
    • An overview of multimedia content protection in consumer electronic devices
    • April
    • A. Eskicioglu and E. Delp. An overview of multimedia content protection in consumer electronic devices. Signal Processing: Image Communication, 16(5):681-699, April 2001.
    • (2001) Signal Processing: Image Communication , vol.16 , Issue.5 , pp. 681-699
    • Eskicioglu, A.1    Delp, E.2
  • 11
    • 0037399649 scopus 로고    scopus 로고
    • Security of digital entertainment content from creation to consumption
    • April
    • A. Eskicioglu, J. Town, and E. Delp. Security of Digital Entertainment Content from Creation to Consumption. Signal Processing: Image Communication, 18(4):237-262, April 2003.
    • (2003) Signal Processing: Image Communication , vol.18 , Issue.4 , pp. 237-262
    • Eskicioglu, A.1    Town, J.2    Delp, E.3
  • 15
    • 0003899818 scopus 로고
    • The kerberos network authentication service (version 5)
    • IETF Network Working Group. Internet Request for Comments RFC-1510
    • J. Kohl and B. Neuman. The Kerberos Network Authentication Service (Version 5). Technical report, IETF Network Working Group, 1993. Internet Request for Comments RFC-1510.
    • (1993) Technical Report
    • Kohl, J.1    Neuman, B.2
  • 16
    • 0003196107 scopus 로고    scopus 로고
    • RFC 2104 HMAC: Keyed-hashing for message authentication
    • Feb.
    • H. Krawczyk, M. Bellare, and R. Canetti. RFC 2104 HMAC: Keyed-Hashing for Message Authentication. Internet RFC 2104, Feb. 1997.
    • (1997) Internet RFC , vol.2104
    • Krawczyk, H.1    Bellare, M.2    Canetti, R.3
  • 22
    • 15744404712 scopus 로고    scopus 로고
    • Defining authorization domains using virtual devices
    • S. Sovio, N. Asokan, and K. Nyberg. Defining Authorization Domains Using Virtual Devices. In SAINT Workshops 2003, pages 331-336, 2003.
    • (2003) SAINT Workshops 2003 , pp. 331-336
    • Sovio, S.1    Asokan, N.2    Nyberg, K.3
  • 23
    • 0036504654 scopus 로고    scopus 로고
    • An authentication logic with formal semantics supporting synchronization, revocation, and recency
    • S. G. Stubblebine and R. N. Wright. An Authentication Logic with Formal Semantics Supporting Synchronization, Revocation, and Recency. IEEE Trans. Softw. Eng., 28(3):256-285, 2002.
    • (2002) IEEE Trans. Softw. Eng. , vol.28 , Issue.3 , pp. 256-285
    • Stubblebine, S.G.1    Wright, R.N.2
  • 25
    • 0032178082 scopus 로고    scopus 로고
    • Secure group communications using key graphs
    • C. Wong, M. Gouda, and S. Lam. Secure Group Communications Using Key Graphs. In Proc. of the ACM SIGCOMM, pages 68-79, 1998.
    • (1998) Proc. of the ACM SIGCOMM , pp. 68-79
    • Wong, C.1    Gouda, M.2    Lam, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.