메뉴 건너뛰기




Volumn , Issue , 2009, Pages 148-154

Replay attack of dynamic rights within an authorised domain

Author keywords

[No Author keywords available]

Indexed keywords

CONTROLLED ENVIRONMENT; DIGITAL RIGHTS MANAGEMENT; REPLAY ATTACK;

EID: 70449480377     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SECURWARE.2009.30     Document Type: Conference Paper
Times cited : (5)

References (13)
  • 2
    • 70449479034 scopus 로고    scopus 로고
    • July 2008
    • Adobe. LiveCycle ES Services, July 2008. http://help.adobe.com/en US/livecycle/8.2/services.pdf.
    • Adobe. LiveCycle ES Services
  • 3
    • 70449476265 scopus 로고    scopus 로고
    • Apple Inc. Apple Fairplay
    • Apple Inc. Apple Fairplay, 2006. http://www.apple.com/lu/support/itunes/ authorization.html.
    • (2006)
  • 4
    • 70449496211 scopus 로고    scopus 로고
    • EMC. EMC Documentum Information Rights Management, December 2006. http://www.emc.com/collateral/software/whitepapers/ h3395 irm tech overview wp.pdf.
    • EMC. EMC Documentum Information Rights Management, December 2006. http://www.emc.com/collateral/software/whitepapers/ h3395 irm tech overview wp.pdf.
  • 5
    • 48249123572 scopus 로고    scopus 로고
    • Digital rights management and consumer acceptability
    • Technical report, DG Information Society, December
    • Natali Helberger, Nicole Dufft, Stef van Gompel, Kristof Kerenyi, Bettina Krings, Rik Lambers, Carsten Orwat, and Ulrich Riehm. Digital rights management and consumer acceptability. Technical report, DG Information Society, December 2004. http://www.indicare.org/soareport.
    • (2004)
    • Helberger, N.1    Dufft, N.2    Stef van Gompel, K.K.3    Krings, B.4    Lambers, R.5    Orwat, C.6    Riehm, U.7
  • 6
    • 36849095062 scopus 로고    scopus 로고
    • IBM Research Division Almaden Research Center
    • IBM Research Division Almaden Research Center. xCP cluster protocol, 2003. http://www-03.ibm.com/solutions/digitalmedia/doc/content /bin/xCPWhitepaper final 1.pdf.
    • (2003) xCP cluster protocol
  • 7
    • 18844381868 scopus 로고    scopus 로고
    • Digital rights management in a 3G mobile phone and beyond
    • Joan Feigenbaum, Tomas Sander, and Moti Yung, editors, ACM Press, NY
    • T. S. Messerges and E. A. Dabbish. Digital rights management in a 3G mobile phone and beyond. In Joan Feigenbaum, Tomas Sander, and Moti Yung, editors, Proceedings of the 3rd ACM workshop on Digital Rights Management, pages 27-38. ACM Press, NY, 2003.
    • (2003) Proceedings of the 3rd ACM workshop on Digital Rights Management , pp. 27-38
    • Messerges, T.S.1    Dabbish, E.A.2
  • 8
    • 70449461500 scopus 로고    scopus 로고
    • Open Mobile Alliance. DRM Specification - Version 2.0, 2006.
    • Open Mobile Alliance. DRM Specification - Version 2.0, 2006.
  • 9
    • 70449473968 scopus 로고    scopus 로고
    • Information rights management, managing information everywhere it is stored and used, June 2008
    • Oracle. Information rights management - managing information everywhere it is stored and used, June 2008. http://www.oracle.com/technology/products/ contentmanagement/ irm/IRMtechnicalwhitepaper.pdf.
    • Oracle
  • 10
    • 38549157185 scopus 로고    scopus 로고
    • Trusted computing - special aspects and challenges
    • V. Geffert et al, editor, Springer-Verlag, Berlin
    • A. Sadeghi. Trusted computing - special aspects and challenges. In V. Geffert et al., editor, SOFSEM, volume 4910 of Lecture Notes in Computer Science, pages 98-117. Springer-Verlag, Berlin, 2008.
    • (2008) SOFSEM, volume 4910 of Lecture Notes in Computer Science , pp. 98-117
    • Sadeghi, A.1
  • 11
    • 38149014725 scopus 로고    scopus 로고
    • A. Sadeghi, M. Wolf1, C. Stble, N. Asokan, and J. Ekberg. Enabling fairer digital rights management with trusted computing. In J. Garay et al., editor, Information Security, 10th International Conference, 4779 of Lecture Notes in Computer Science, pages 53-70. Springer-Verlag, Berlin, 2007.
    • A. Sadeghi, M. Wolf1, C. Stble, N. Asokan, and J. Ekberg. Enabling fairer digital rights management with trusted computing. In J. Garay et al., editor, Information Security, 10th International Conference, volume 4779 of Lecture Notes in Computer Science, pages 53-70. Springer-Verlag, Berlin, 2007.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.