-
1
-
-
77956501016
-
Rights-preserving interoperability protocol in DRM
-
text in Korean
-
H. Park, S. Lee, and J. Kim, "Rights-preserving interoperability protocol in DRM," in Proceedings of Conference on Information Security and Cryptology - Winter 2008 (CISC-W08), 2008, pp. 141-144, text in Korean.
-
(2008)
Proceedings of Conference on Information Security and Cryptology - Winter 2008 (CISC-W08)
, pp. 141-144
-
-
Park, H.1
Lee, S.2
Kim, J.3
-
2
-
-
47649100786
-
-
Department of Computer Science, Katholieke Universiteit Leuven, Tech. Rep., November
-
S. Michiels, W. Joosen, E. Truyen, and K. Verslype, "Digital rights management-a survey of existing technologies," Department of Computer Science, Katholieke Universiteit Leuven, Tech. Rep., November 2005.
-
(2005)
Digital Rights Management-a Survey of Existing Technologies
-
-
Michiels, S.1
Joosen, W.2
Truyen, E.3
Verslype, K.4
-
4
-
-
77956528558
-
Temptations of the walled garden: Digital rights management and mobile phone carriers
-
N. W. Netanel, "Temptations of the walled garden: Digital rights management and mobile phone carriers," Journal on Telecommunications and High Technology Law, vol.6, 2007.
-
(2007)
Journal on Telecommunications and High Technology Law
, vol.6
-
-
Netanel, N.W.1
-
5
-
-
18844414754
-
The long march to interoperable digital rights management
-
June
-
R. H. Koenen, J. Lacy, M. Mackay, and S. Mitchell, "The long march to interoperable digital rights management," Proceedings of IEEE, vol.92, no.6, pp. 883-897, June 2004.
-
(2004)
Proceedings of IEEE
, vol.92
, Issue.6
, pp. 883-897
-
-
Koenen, R.H.1
Lacy, J.2
MacKay, M.3
Mitchell, S.4
-
6
-
-
33644504823
-
-
May
-
N. Dufft, A. Stiehler, D. Vogeley, and T. Wichmann, "Digital music usage and DRM-results from an european consumer survey," May 2005, http://www.indicare.org/survey.
-
(2005)
Digital Music Usage and DRM-results from An European Consumer Survey
-
-
Dufft, N.1
Stiehler, A.2
Vogeley, D.3
Wichmann, T.4
-
10
-
-
77954363827
-
Towards a secure and interoperable DRM architecture
-
G. Taban, A. A. Cárdenas, and V. D. Gligor, "Towards a secure and interoperable DRM architecture," in Proceedings of the 6th ACM workshop on Digital Rights Management, 2006, pp. 69-78.
-
(2006)
Proceedings of the 6th ACM Workshop on Digital Rights Management
, pp. 69-78
-
-
Taban, G.1
Cárdenas, A.A.2
Gligor, V.D.3
-
11
-
-
33745218758
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
G. Ateniese, K. Fu, M. Green, and S. Hohenberger, "Improved proxy re-encryption schemes with applications to secure distributed storage," ACM Transactions on Information and System Security (TISSEC), vol.9, no.1, pp. 1-30, 2006.
-
(2006)
ACM Transactions on Information and System Security (TISSEC)
, vol.9
, Issue.1
, pp. 1-30
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
13
-
-
63849159851
-
Electronic copyright management systems: Requirements, players and technologies
-
F. Bartolini, V. Cappellini, A. Piva, and A. Fringuelli, "Electronic copyright management systems: Requirements, players and technologies," in Proceedings of the 10th International Workshop on Database and Expert System Applications, 1999, pp. 896-898.
-
(1999)
Proceedings of the 10th International Workshop on Database and Expert System Applications
, pp. 896-898
-
-
Bartolini, F.1
Cappellini, V.2
Piva, A.3
Fringuelli, A.4
-
14
-
-
11144292628
-
How DRM-based content delivery system disrupt expectations of "personal use"
-
D. Mulligan, J. Han, and A. J. Burstein, "How DRM-based content delivery system disrupt expectations of "personal use"," in Proceedings of the 3rd ACM workshop on Digital Rights Management, 2003, pp. 77-89.
-
(2003)
Proceedings of the 3rd ACM Workshop on Digital Rights Management
, pp. 77-89
-
-
Mulligan, D.1
Han, J.2
Burstein, A.J.3
-
15
-
-
84949513306
-
Security architectures for controlled digital information dissemination
-
J. Park, R. Sandhu, and J. Schifalacqua, "Security architectures for controlled digital information dissemination," in Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC'00), 2000, pp. 224-233.
-
(2000)
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC'00)
, pp. 224-233
-
-
Park, J.1
Sandhu, R.2
Schifalacqua, J.3
-
16
-
-
33847753565
-
The transport layer security (TLS) protocol version 1.2
-
(Proposed Standard), Internet Engineering Task Force, Aug. 2008. [Online]. Available
-
T. Dierks and E. Rescorla, "The Transport Layer Security (TLS) Protocol Version 1.2," RFC 5246 (Proposed Standard), Internet Engineering Task Force, Aug. 2008. [Online]. Available: http://www.ietf.org/rfc/rfc5246.txt
-
RFC
, vol.5246
-
-
Dierks, T.1
Rescorla, E.2
-
17
-
-
0035149278
-
Simple micro-payment scheme
-
January
-
M.-S. Hwang, I.-C. Lin, and L.-H. Li, "Simple micro-payment scheme," Journal of Systems and Software, vol.55, no.3, pp. 221-229, January 2001.
-
(2001)
Journal of Systems and Software
, vol.55
, Issue.3
, pp. 221-229
-
-
Hwang, M.-S.1
Lin, I.-C.2
Li, L.-H.3
|