메뉴 건너뛰기




Volumn , Issue , 2010, Pages 397-403

A new DRM architecture with strong enforcement

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHIC TECHNIQUES; DIGITAL RIGHTS; DRM ARCHITECTURES;

EID: 77952416464     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2010.26     Document Type: Conference Paper
Times cited : (12)

References (16)
  • 4
    • 69949143544 scopus 로고    scopus 로고
    • Conjunctive broadcast and attribute-based encryption
    • H. Shacham and B. Waters, Eds. Springer
    • N. Attrapadung and H. Imai, "Conjunctive broadcast and attribute-based encryption," in Pairing, ser. Lecture Notes in Computer Science, H. Shacham and B. Waters, Eds., vol. 5671. Springer, 2009, pp. 248-265.
    • (2009) Pairing, Ser. Lecture Notes in Computer Science , vol.5671 , pp. 248-265
    • Attrapadung, N.1    Imai, H.2
  • 7
    • 38049078557 scopus 로고    scopus 로고
    • Multi-authority attribute based encryption
    • S.P. Vadhan, Ed. Amsterdam, The Netherlands: Springer, February
    • M. Chase, "Multi-authority attribute based encryption," in Theory of Cryptography Conference, TCC 2007, ser. Lecture Notes in Computer Science, S. P. Vadhan, Ed., vol. 4392. Amsterdam, The Netherlands: Springer, February 2007, pp. 515-534.
    • (2007) Theory of Cryptography Conference, TCC 2007, Ser. Lecture Notes in Computer Science , vol.4392 , pp. 515-534
    • Chase, M.1
  • 9
    • 77952383290 scopus 로고    scopus 로고
    • Attribute-based encryption with partially hidden ciphertext policies
    • T. Nishide, K. Yoneyama, and K. Ohta, "Attribute-based encryption with partially hidden ciphertext policies," IEICE Transactions, vol. 92-A, no. 1, pp. 22-32, 2009.
    • (2009) IEICE Transactions , vol.92 A , Issue.1 , pp. 22-32
    • Nishide, T.1    Yoneyama, K.2    Ohta, K.3
  • 10
    • 77952390316 scopus 로고    scopus 로고
    • August [Online]. Available
    • "Open digital rights language," August 2002. [Online]. Available: http://odrl.net
    • (2002)
  • 12
    • 45749116552 scopus 로고    scopus 로고
    • Provably secure ciphertext policy ABE
    • P. Ning, S.D.C. di Vimercati, and P.F. Syverson, Eds. ACM
    • L. Cheung and C. C. Newport, "Provably secure ciphertext policy ABE," in ACM Conference on Computer and Communications Security, P. Ning, S. D. C. di Vimercati, and P. F. Syverson, Eds. ACM, 2007, pp. 456-465.
    • (2007) ACM Conference on Computer and Communications Security , pp. 456-465
    • Cheung, L.1    Newport, C.C.2
  • 15
    • 77952407083 scopus 로고    scopus 로고
    • Provably secure and efficient bounded ciphertext policy attribute based encryption
    • W. Li, W. Susilo, U.K. Tupakula, R. Safavi-Naini, and V. Varadharajan, Eds. ACM
    • X. Liang, Z. Cao, H. Lin, and D. Xing, "Provably secure and efficient bounded ciphertext policy attribute based encryption," in 4th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, W. Li, W. Susilo, U. K. Tupakula, R. Safavi-Naini, and V. Varadharajan, Eds. ACM, 2009, pp. 343-352.
    • (2009) 4th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009 , pp. 343-352
    • Liang, X.1    Cao, Z.2    Lin, H.3    Xing, D.4
  • 16
    • 69649091318 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
    • work in progress. [Online]. Available
    • B. Waters, "Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization," SRI International, Tech. Rep., 2008, work in progress. [Online]. Available: http://eprint.iacr. org/2008/290.pdf
    • (2008) SRI International, Tech. Rep.
    • Waters, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.