![]() |
Volumn , Issue , 2008, Pages 3-7
|
An efficient key distribution method applying to OMA DRM 2.0 with Device Identifier
|
Author keywords
[No Author keywords available]
|
Indexed keywords
ASYMMETRIC ALGORITHMS;
CORE COMPONENTS;
CRYPTOGRAPHIC OPERATIONS;
DIGITAL CONTENTS;
DIGITAL RIGHTS MANAGEMENTS;
ENERGY CONSUMPTIONS;
GENERAL DESCRIPTIONS;
KEY DISTRIBUTIONS;
MOBILE TERMINALS;
OPEN MOBILE ALLIANCES;
PROCESSING TIMES;
SECURITY ANALYSES;
SYMMETRIC ALGORITHMS;
SYMMETRIC ENCRYPTIONS;
APPLICATIONS;
ARTIFICIAL INTELLIGENCE;
COMPUTER TERMINALS;
COPYRIGHTS;
CRYPTOGRAPHY;
DIGITAL DEVICES;
ELECTRIC LOAD FORECASTING;
INTERNET;
MOBILE DEVICES;
MOBILE PHONES;
PAPER;
PORT TERMINALS;
SOFTWARE ENGINEERING;
TECHNICAL PRESENTATIONS;
TELECOMMUNICATION EQUIPMENT;
WIRELESS NETWORKS;
|
EID: 57749179103
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/SNPD.2008.76 Document Type: Conference Paper |
Times cited : (3)
|
References (8)
|